Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
m4VuyJtPKi.exe

Overview

General Information

Sample name:m4VuyJtPKi.exe
renamed because original name is a hash value
Original sample name:43794e837b00b4da73a178e2fb0d3edd.exe
Analysis ID:1549862
MD5:43794e837b00b4da73a178e2fb0d3edd
SHA1:fed7de621ea796de9dd649a8730ba3d0f152836a
SHA256:2b57393b6c3bab50e5864dcb98bcfa3789c631bf7f88b1dab9d193faafba32c0
Tags:exeRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Delayed program exit found
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • m4VuyJtPKi.exe (PID: 5948 cmdline: "C:\Users\user\Desktop\m4VuyJtPKi.exe" MD5: 43794E837B00B4DA73A178E2FB0D3EDD)
    • iexplore.exe (PID: 6204 cmdline: "c:\program files (x86)\internet explorer\iexplore.exe" MD5: 6F0F06D6AB125A99E43335427066A4A1)
  • OpenWith.exe (PID: 2944 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
  • OpenWith.exe (PID: 5548 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
  • OpenWith.exe (PID: 1996 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["46.175.167.116:2404:1"], "Assigned name": "Realtek Driver", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "System32", "Copy file": "Realtek Driver", "Startup value": "Disable", "Hide file": "Enable", "Mutex": "Microsoft-T7EFTY", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Windows", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
m4VuyJtPKi.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    m4VuyJtPKi.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
      m4VuyJtPKi.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        m4VuyJtPKi.exeWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aab8:$a1: Remcos restarted by watchdog!
        • 0x6b030:$a3: %02i:%02i:%02i:%03i
        m4VuyJtPKi.exeREMCOS_RAT_variantsunknownunknown
        • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64b7c:$str_b2: Executing file:
        • 0x65bfc:$str_b3: GetDirectListeningPort
        • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65728:$str_b7: \update.vbs
        • 0x64ba4:$str_b9: Downloaded file:
        • 0x64b90:$str_b10: Downloading file:
        • 0x64c34:$str_b12: Failed to upload file:
        • 0x65bc4:$str_b13: StartForward
        • 0x65be4:$str_b14: StopForward
        • 0x65680:$str_b15: fso.DeleteFile "
        • 0x65614:$str_b16: On Error Resume Next
        • 0x656b0:$str_b17: fso.DeleteFolder "
        • 0x64c24:$str_b18: Uploaded file:
        • 0x64be4:$str_b19: Unable to delete:
        • 0x65648:$str_b20: while fso.FileExists("
        • 0x650c1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        C:\Windows\SysWOW64\Windows\Realtek DriverJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          C:\Windows\SysWOW64\Windows\Realtek DriverJoeSecurity_RemcosYara detected Remcos RATJoe Security
            C:\Windows\SysWOW64\Windows\Realtek DriverJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              C:\Windows\SysWOW64\Windows\Realtek DriverWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6aab8:$a1: Remcos restarted by watchdog!
              • 0x6b030:$a3: %02i:%02i:%02i:%03i
              C:\Windows\SysWOW64\Windows\Realtek DriverREMCOS_RAT_variantsunknownunknown
              • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
              • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x64b7c:$str_b2: Executing file:
              • 0x65bfc:$str_b3: GetDirectListeningPort
              • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x65728:$str_b7: \update.vbs
              • 0x64ba4:$str_b9: Downloaded file:
              • 0x64b90:$str_b10: Downloading file:
              • 0x64c34:$str_b12: Failed to upload file:
              • 0x65bc4:$str_b13: StartForward
              • 0x65be4:$str_b14: StopForward
              • 0x65680:$str_b15: fso.DeleteFile "
              • 0x65614:$str_b16: On Error Resume Next
              • 0x656b0:$str_b17: fso.DeleteFolder "
              • 0x64c24:$str_b18: Uploaded file:
              • 0x64be4:$str_b19: Unable to delete:
              • 0x65648:$str_b20: while fso.FileExists("
              • 0x650c1:$str_c0: [Firefox StoredLogins not found]
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              00000001.00000002.3316238419.0000000002AE0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                00000001.00000002.3316238419.0000000002AEB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  00000000.00000002.2069419897.000000000062E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                    00000000.00000002.2069419897.000000000062E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                      00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                        Click to see the 31 entries
                        SourceRuleDescriptionAuthorStrings
                        1.2.iexplore.exe.340000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                          1.2.iexplore.exe.340000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                            1.2.iexplore.exe.340000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                              1.2.iexplore.exe.340000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                              • 0x6c4b8:$a1: Remcos restarted by watchdog!
                              • 0x6ca30:$a3: %02i:%02i:%02i:%03i
                              1.2.iexplore.exe.340000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                              • 0x6650c:$str_a1: C:\Windows\System32\cmd.exe
                              • 0x66488:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                              • 0x66488:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                              • 0x66988:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                              • 0x671b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                              • 0x6657c:$str_b2: Executing file:
                              • 0x675fc:$str_b3: GetDirectListeningPort
                              • 0x66fa8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                              • 0x67128:$str_b7: \update.vbs
                              • 0x665a4:$str_b9: Downloaded file:
                              • 0x66590:$str_b10: Downloading file:
                              • 0x66634:$str_b12: Failed to upload file:
                              • 0x675c4:$str_b13: StartForward
                              • 0x675e4:$str_b14: StopForward
                              • 0x67080:$str_b15: fso.DeleteFile "
                              • 0x67014:$str_b16: On Error Resume Next
                              • 0x670b0:$str_b17: fso.DeleteFolder "
                              • 0x66624:$str_b18: Uploaded file:
                              • 0x665e4:$str_b19: Unable to delete:
                              • 0x67048:$str_b20: while fso.FileExists("
                              • 0x66ac1:$str_c0: [Firefox StoredLogins not found]
                              Click to see the 31 entries

                              System Summary

                              barindex
                              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Windows\SysWOW64\Windows\Realtek Driver", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\m4VuyJtPKi.exe, ProcessId: 5948, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft-T7EFTY
                              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Windows\SysWOW64\Windows\Realtek Driver", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\m4VuyJtPKi.exe, ProcessId: 5948, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft-T7EFTY
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2024-11-06T07:44:22.979602+010020229301A Network Trojan was detected172.202.163.200443192.168.2.549713TCP
                              2024-11-06T07:45:02.071319+010020229301A Network Trojan was detected172.202.163.200443192.168.2.549942TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2024-11-06T07:44:04.839408+010020365941Malware Command and Control Activity Detected192.168.2.54970646.175.167.1162404TCP
                              2024-11-06T07:45:06.105028+010020365941Malware Command and Control Activity Detected192.168.2.54996346.175.167.1162404TCP
                              2024-11-06T07:46:06.026910+010020365941Malware Command and Control Activity Detected192.168.2.54998646.175.167.1162404TCP

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: m4VuyJtPKi.exeAvira: detected
                              Source: C:\Windows\SysWOW64\Windows\Realtek DriverAvira: detection malicious, Label: BDS/Backdoor.Gen
                              Source: 00000001.00000002.3316238419.0000000002AEB000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["46.175.167.116:2404:1"], "Assigned name": "Realtek Driver", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "System32", "Copy file": "Realtek Driver", "Startup value": "Disable", "Hide file": "Enable", "Mutex": "Microsoft-T7EFTY", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Windows", "Keylog folder": "remcos"}
                              Source: C:\Windows\SysWOW64\Windows\Realtek DriverReversingLabs: Detection: 86%
                              Source: C:\Windows\SysWOW64\Windows\Realtek DriverVirustotal: Detection: 80%Perma Link
                              Source: m4VuyJtPKi.exeReversingLabs: Detection: 86%
                              Source: m4VuyJtPKi.exeVirustotal: Detection: 80%Perma Link
                              Source: Yara matchFile source: m4VuyJtPKi.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000001.00000002.3316238419.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.3316238419.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2069419897.000000000062E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: m4VuyJtPKi.exe PID: 5948, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6204, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPED
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                              Source: C:\Windows\SysWOW64\Windows\Realtek DriverJoe Sandbox ML: detected
                              Source: m4VuyJtPKi.exeJoe Sandbox ML: detected
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_004338C8
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003738C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,1_2_003738C8
                              Source: m4VuyJtPKi.exe, 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_68c3932f-a

                              Exploits

                              barindex
                              Source: Yara matchFile source: m4VuyJtPKi.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000002.2069419897.000000000062E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: m4VuyJtPKi.exe PID: 5948, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6204, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPED

                              Privilege Escalation

                              barindex
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00407538 _wcslen,CoGetObject,0_2_00407538
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00347538 _wcslen,CoGetObject,1_2_00347538
                              Source: m4VuyJtPKi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040928E
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C322
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C388
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004096A0
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00408847
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00407877 FindFirstFileW,FindNextFileW,0_2_00407877
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0044E8F9 FindFirstFileExA,0_2_0044E8F9
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB6B
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419B86
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD72
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0034928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,1_2_0034928E
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0035C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,1_2_0035C322
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0034C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,1_2_0034C388
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003496A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,1_2_003496A0
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00347877 FindFirstFileW,FindNextFileW,1_2_00347877
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00348847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,1_2_00348847
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0038E8F9 FindFirstFileExA,1_2_0038E8F9
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0034BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,1_2_0034BB6B
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00359B86 FindFirstFileW,FindNextFileW,FindNextFileW,1_2_00359B86
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0034BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,1_2_0034BD72
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407CD2

                              Networking

                              barindex
                              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49706 -> 46.175.167.116:2404
                              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49963 -> 46.175.167.116:2404
                              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49986 -> 46.175.167.116:2404
                              Source: Malware configuration extractorIPs: 46.175.167.116
                              Source: global trafficTCP traffic: 192.168.2.5:49706 -> 46.175.167.116:2404
                              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.5:49713
                              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.5:49942
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_0041B411
                              Source: m4VuyJtPKi.exe, iexplore.exeString found in binary or memory: http://geoplugin.net/json.gp
                              Source: m4VuyJtPKi.exe, Realtek Driver.0.drString found in binary or memory: http://geoplugin.net/json.gp/C

                              Key, Mouse, Clipboard, Microphone and Screen Capturing

                              barindex
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000000_2_0040A2F3
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B749
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004168FC
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003568FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_003568FC
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B749
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,0_2_0040A41B
                              Source: Yara matchFile source: m4VuyJtPKi.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: m4VuyJtPKi.exe PID: 5948, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6204, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPED

                              E-Banking Fraud

                              barindex
                              Source: Yara matchFile source: m4VuyJtPKi.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000001.00000002.3316238419.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.3316238419.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2069419897.000000000062E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: m4VuyJtPKi.exe PID: 5948, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6204, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPED

                              Spam, unwanted Advertisements and Ransom Demands

                              barindex
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041CA73 SystemParametersInfoW,0_2_0041CA73
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0035CA73 SystemParametersInfoW,1_2_0035CA73

                              System Summary

                              barindex
                              Source: m4VuyJtPKi.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: m4VuyJtPKi.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: m4VuyJtPKi.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: Process Memory Space: m4VuyJtPKi.exe PID: 5948, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: Process Memory Space: iexplore.exe PID: 6204, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,0_2_0041812A
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,0_2_0041330D
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,0_2_0041BBC6
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,0_2_0041BB9A
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_004167EF
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003567EF ExitWindowsEx,LoadLibraryA,GetProcAddress,1_2_003567EF
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeFile created: C:\Windows\SysWOW64\WindowsJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeFile created: C:\Windows\SysWOW64\Windows\Realtek DriverJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeFile created: C:\Windows\SysWOW64\Windows\Realtek Driver:Zone.Identifier:$DATAJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0043706A0_2_0043706A
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004140050_2_00414005
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0043E11C0_2_0043E11C
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004541D90_2_004541D9
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004381E80_2_004381E8
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041F18B0_2_0041F18B
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004462700_2_00446270
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0043E34B0_2_0043E34B
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004533AB0_2_004533AB
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0042742E0_2_0042742E
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004375660_2_00437566
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0043E5A80_2_0043E5A8
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004387F00_2_004387F0
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0043797E0_2_0043797E
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004339D70_2_004339D7
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0044DA490_2_0044DA49
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00427AD70_2_00427AD7
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041DBF30_2_0041DBF3
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00427C400_2_00427C40
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00437DB30_2_00437DB3
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00435EEB0_2_00435EEB
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0043DEED0_2_0043DEED
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00426E9F0_2_00426E9F
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003540051_2_00354005
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0037706A1_2_0037706A
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0037E11C1_2_0037E11C
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0035F18B1_2_0035F18B
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003781E81_2_003781E8
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003941D91_2_003941D9
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003862701_2_00386270
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0037E34B1_2_0037E34B
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003933AB1_2_003933AB
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0036742E1_2_0036742E
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003775661_2_00377566
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0037E5A81_2_0037E5A8
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003787F01_2_003787F0
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0037797E1_2_0037797E
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003739D71_2_003739D7
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0038DA491_2_0038DA49
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00367AD71_2_00367AD7
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0035DBF31_2_0035DBF3
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00367C401_2_00367C40
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00377DB31_2_00377DB3
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00366E9F1_2_00366E9F
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0037DEED1_2_0037DEED
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00375EEB1_2_00375EEB
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: String function: 00402093 appears 50 times
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: String function: 00401E65 appears 34 times
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: String function: 00434E70 appears 54 times
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: String function: 00434801 appears 42 times
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00374E70 appears 54 times
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00374801 appears 41 times
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00341E65 appears 34 times
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00342093 appears 50 times
                              Source: m4VuyJtPKi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: m4VuyJtPKi.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: m4VuyJtPKi.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: m4VuyJtPKi.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: Process Memory Space: m4VuyJtPKi.exe PID: 5948, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: Process Memory Space: iexplore.exe PID: 6204, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                              Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@6/2@0/1
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_0041798D
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0035798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,1_2_0035798D
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_0040F4AF
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,0_2_0041B539
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AADB
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeMutant created: \Sessions\1\BaseNamedObjects\Microsoft-T7EFTY
                              Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1996:120:WilError_03
                              Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5548:120:WilError_03
                              Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2944:120:WilError_03
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: Software\0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: Exe0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: ,aF0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: Inj0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: Inj0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: 8SG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: exepath0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: ,aF0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: 8SG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: exepath0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: licence0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: dMG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: PSG0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: Administrator0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: User0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: del0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: del0_2_0040EA00
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCommand line argument: del0_2_0040EA00
                              Source: m4VuyJtPKi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: m4VuyJtPKi.exeReversingLabs: Detection: 86%
                              Source: m4VuyJtPKi.exeVirustotal: Detection: 80%
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeFile read: C:\Users\user\Desktop\m4VuyJtPKi.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\m4VuyJtPKi.exe "C:\Users\user\Desktop\m4VuyJtPKi.exe"
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"
                              Source: unknownProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding
                              Source: unknownProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding
                              Source: unknownProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"Jump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: winmm.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: wininet.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: rstrtmgr.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: twext.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: ntshrui.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: cscapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: twinapi.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinui.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dwmapi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: pdh.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: actxprxy.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.appdefaults.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.immersive.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: uiautomationcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dui70.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: duser.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dwrite.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47mrm.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: uianimation.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d11.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dxgi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d10warp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: resourcepolicyclient.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dxcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dcomp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: oleacc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windowmanagementapi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: inputhost.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: thumbcache.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: policymanager.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: msvcp110_win.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: tiledatarepository.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: staterepository.core.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepository.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositorycore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: mrmcorer.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: appxdeploymentclient.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: sxs.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: directmanipulation.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinui.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dwmapi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: pdh.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: actxprxy.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.appdefaults.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.immersive.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: uiautomationcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dui70.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: duser.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dwrite.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47mrm.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: uianimation.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d11.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dxgi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d10warp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: resourcepolicyclient.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dxcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dcomp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: oleacc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windowmanagementapi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: inputhost.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: thumbcache.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: tiledatarepository.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: staterepository.core.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepository.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositorycore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: mrmcorer.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: appxdeploymentclient.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: sxs.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: directmanipulation.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinui.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dwmapi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: pdh.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: actxprxy.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.appdefaults.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.immersive.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: uiautomationcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dui70.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: duser.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dwrite.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47mrm.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: uianimation.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d11.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dxgi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d10warp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: resourcepolicyclient.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dxcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: dcomp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: oleacc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windowmanagementapi.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: inputhost.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: thumbcache.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: tiledatarepository.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: staterepository.core.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepository.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositorycore.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: mrmcorer.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: appxdeploymentclient.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: sxs.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: directmanipulation.dllJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                              Source: m4VuyJtPKi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                              Source: m4VuyJtPKi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                              Source: m4VuyJtPKi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                              Source: m4VuyJtPKi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: m4VuyJtPKi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                              Source: m4VuyJtPKi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                              Source: m4VuyJtPKi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: m4VuyJtPKi.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                              Source: m4VuyJtPKi.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                              Source: m4VuyJtPKi.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                              Source: m4VuyJtPKi.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                              Source: m4VuyJtPKi.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00457186 push ecx; ret 0_2_00457199
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00457AA8 push eax; ret 0_2_00457AC6
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00434EB6 push ecx; ret 0_2_00434EC9
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00406EEB ShellExecuteW,URLDownloadToFileW,0_2_00406EEB
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeFile created: C:\Windows\SysWOW64\Windows\Realtek DriverJump to dropped file
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeFile created: C:\Windows\SysWOW64\Windows\Realtek DriverJump to dropped file
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeFile created: C:\Windows\SysWOW64\Windows\Realtek DriverJump to dropped file

                              Boot Survival

                              barindex
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft-T7EFTYJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Microsoft-T7EFTYJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Microsoft-T7EFTYJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Microsoft-T7EFTYJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Microsoft-T7EFTYJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft-T7EFTYJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AADB
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft-T7EFTYJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft-T7EFTYJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Microsoft-T7EFTYJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Microsoft-T7EFTYJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                              Malware Analysis System Evasion

                              barindex
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040F7E2 Sleep,ExitProcess,0_2_0040F7E2
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0034F7E2 Sleep,ExitProcess,1_2_0034F7E2
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_0041A7D9
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,1_2_0035A7D9
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeAPI coverage: 9.3 %
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040928E
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C322
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C388
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004096A0
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00408847
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00407877 FindFirstFileW,FindNextFileW,0_2_00407877
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0044E8F9 FindFirstFileExA,0_2_0044E8F9
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB6B
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419B86
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD72
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0034928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,1_2_0034928E
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0035C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,1_2_0035C322
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0034C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,1_2_0034C388
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_003496A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,1_2_003496A0
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00347877 FindFirstFileW,FindNextFileW,1_2_00347877
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00348847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,1_2_00348847
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0038E8F9 FindFirstFileExA,1_2_0038E8F9
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0034BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,1_2_0034BB6B
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00359B86 FindFirstFileW,FindNextFileW,FindNextFileW,1_2_00359B86
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0034BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,1_2_0034BD72
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407CD2
                              Source: m4VuyJtPKi.exe, 00000000.00000002.2069419897.000000000062E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                              Source: iexplore.exe, 00000001.00000002.3316238419.0000000002AEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeAPI call chain: ExitProcess graph end nodegraph_0-47671
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeAPI call chain: ExitProcess graph end nodegraph_1-48859
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00434A8A
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00443355 mov eax, dword ptr fs:[00000030h]0_2_00443355
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00383355 mov eax, dword ptr fs:[00000030h]1_2_00383355
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_004120B2 GetProcessHeap,HeapFree,0_2_004120B2
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043503C
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00434A8A
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043BB71
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00434BD8 SetUnhandledExceptionFilter,0_2_00434BD8
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0037503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0037503C
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00374A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00374A8A
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_0037BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0037BB71
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 1_2_00374BD8 SetUnhandledExceptionFilter,1_2_00374BD8

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,0_2_0041812A
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeSection loaded: NULL target: C:\Program Files (x86)\Internet Explorer\iexplore.exe protection: execute and read and writeJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 42F008Jump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00412132
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe1_2_00352132
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00419662 mouse_event,0_2_00419662
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"Jump to behavior
                              Source: iexplore.exe, 00000001.00000002.3316238419.0000000002AEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                              Source: iexplore.exe, 00000001.00000002.3316238419.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000001.00000002.3316238419.0000000002AE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00434CB6 cpuid 0_2_00434CB6
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: EnumSystemLocalesW,0_2_0045201B
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: EnumSystemLocalesW,0_2_004520B6
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00452143
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: GetLocaleInfoW,0_2_00452393
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: EnumSystemLocalesW,0_2_00448484
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004524BC
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: GetLocaleInfoW,0_2_004525C3
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00452690
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: GetLocaleInfoW,0_2_0044896D
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: GetLocaleInfoA,0_2_0040F90C
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00451D58
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: EnumSystemLocalesW,0_2_00451FD0
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,1_2_0039201B
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,1_2_003920B6
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,1_2_00392143
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,1_2_00392393
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_003924BC
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,1_2_00388484
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,1_2_003925C3
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,1_2_00392690
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoA,1_2_0034F90C
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,1_2_0038896D
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,1_2_00391D58
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,1_2_00391FD0
                              Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
                              Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041A045 __EH_prolog,GdiplusStartup,CreateDirectoryW,Sleep,Sleep,GetLocalTime,Sleep,0_2_0041A045
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_0041B69E GetComputerNameExW,GetUserNameW,0_2_0041B69E
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: 0_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00449210

                              Stealing of Sensitive Information

                              barindex
                              Source: Yara matchFile source: m4VuyJtPKi.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000001.00000002.3316238419.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.3316238419.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2069419897.000000000062E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: m4VuyJtPKi.exe PID: 5948, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6204, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPED
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040BA4D
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data1_2_0034BA4D
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040BB6B
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: \key3.db0_2_0040BB6B
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\1_2_0034BB6B
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \key3.db1_2_0034BB6B

                              Remote Access Functionality

                              barindex
                              Source: Yara matchFile source: m4VuyJtPKi.exe, type: SAMPLE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 1.2.iexplore.exe.340000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.m4VuyJtPKi.exe.4800000.1.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000001.00000002.3316238419.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.3316238419.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2069419897.000000000062E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: m4VuyJtPKi.exe PID: 5948, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6204, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Windows\SysWOW64\Windows\Realtek Driver, type: DROPPED
                              Source: C:\Users\user\Desktop\m4VuyJtPKi.exeCode function: cmd.exe0_2_0040569A
                              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: cmd.exe1_2_0034569A
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                              Native API
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              1
                              Deobfuscate/Decode Files or Information
                              1
                              OS Credential Dumping
                              2
                              System Time Discovery
                              Remote Services11
                              Archive Collected Data
                              11
                              Ingress Tool Transfer
                              Exfiltration Over Other Network Medium1
                              System Shutdown/Reboot
                              CredentialsDomainsDefault Accounts12
                              Command and Scripting Interpreter
                              1
                              Windows Service
                              1
                              Bypass User Account Control
                              2
                              Obfuscated Files or Information
                              111
                              Input Capture
                              1
                              Account Discovery
                              Remote Desktop Protocol111
                              Input Capture
                              2
                              Encrypted Channel
                              Exfiltration Over Bluetooth1
                              Defacement
                              Email AddressesDNS ServerDomain Accounts2
                              Service Execution
                              31
                              Registry Run Keys / Startup Folder
                              1
                              Access Token Manipulation
                              1
                              DLL Side-Loading
                              2
                              Credentials In Files
                              1
                              System Service Discovery
                              SMB/Windows Admin Shares3
                              Clipboard Data
                              1
                              Non-Standard Port
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                              Windows Service
                              1
                              Bypass User Account Control
                              NTDS3
                              File and Directory Discovery
                              Distributed Component Object ModelInput Capture1
                              Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script322
                              Process Injection
                              3
                              Masquerading
                              LSA Secrets32
                              System Information Discovery
                              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts31
                              Registry Run Keys / Startup Folder
                              1
                              Access Token Manipulation
                              Cached Domain Credentials121
                              Security Software Discovery
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items322
                              Process Injection
                              DCSync3
                              Process Discovery
                              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                              System Owner/User Discovery
                              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              m4VuyJtPKi.exe87%ReversingLabsWin32.Backdoor.Remcos
                              m4VuyJtPKi.exe81%VirustotalBrowse
                              m4VuyJtPKi.exe100%AviraBDS/Backdoor.Gen
                              m4VuyJtPKi.exe100%Joe Sandbox ML
                              SourceDetectionScannerLabelLink
                              C:\Windows\SysWOW64\Windows\Realtek Driver100%AviraBDS/Backdoor.Gen
                              C:\Windows\SysWOW64\Windows\Realtek Driver100%Joe Sandbox ML
                              C:\Windows\SysWOW64\Windows\Realtek Driver87%ReversingLabsWin32.Backdoor.Remcos
                              C:\Windows\SysWOW64\Windows\Realtek Driver81%VirustotalBrowse
                              No Antivirus matches
                              No Antivirus matches
                              No Antivirus matches
                              No contacted domains info
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://geoplugin.net/json.gpm4VuyJtPKi.exe, iexplore.exefalse
                                high
                                http://geoplugin.net/json.gp/Cm4VuyJtPKi.exe, Realtek Driver.0.drfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  46.175.167.116
                                  unknownUkraine
                                  56404NORMA4-ASUAtrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1549862
                                  Start date and time:2024-11-06 07:43:08 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 5m 18s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:9
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:m4VuyJtPKi.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:43794e837b00b4da73a178e2fb0d3edd.exe
                                  Detection:MAL
                                  Classification:mal100.rans.troj.spyw.expl.evad.winEXE@6/2@0/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 44
                                  • Number of non-executed functions: 369
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  01:44:12API Interceptor3x Sleep call for process: OpenWith.exe modified
                                  07:44:04AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Microsoft-T7EFTY "C:\Windows\SysWOW64\Windows\Realtek Driver"
                                  07:44:12AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Microsoft-T7EFTY "C:\Windows\SysWOW64\Windows\Realtek Driver"
                                  07:44:20AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Microsoft-T7EFTY "C:\Windows\SysWOW64\Windows\Realtek Driver"
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\m4VuyJtPKi.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):494592
                                  Entropy (8bit):6.601524149173778
                                  Encrypted:false
                                  SSDEEP:6144:oTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZXAXkcrWT4:oTlrYw1RUh3NFn+N5WfIQIjbs/ZXFT4
                                  MD5:43794E837B00B4DA73A178E2FB0D3EDD
                                  SHA1:FED7DE621EA796DE9DD649A8730BA3D0F152836A
                                  SHA-256:2B57393B6C3BAB50E5864DCB98BCFA3789C631BF7F88B1DAB9D193FAAFBA32C0
                                  SHA-512:B270959D76200097A8E3020889EE6012DD7D26477B3B53D491D0F87B547D43C33ACD9A6AF77BB8BA988B01C0FFEE0317C9E56D60996DFBB67358BE1DA3271E61
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Windows\SysWOW64\Windows\Realtek Driver, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Windows\SysWOW64\Windows\Realtek Driver, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Windows\SysWOW64\Windows\Realtek Driver, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Windows\SysWOW64\Windows\Realtek Driver, Author: unknown
                                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Windows\SysWOW64\Windows\Realtek Driver, Author: unknown
                                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Windows\SysWOW64\Windows\Realtek Driver, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 87%
                                  • Antivirus: Virustotal, Detection: 81%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...I..f.................r...........J............@.......................... ..........................................................LK.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc...LK.......L..................@..@.reloc...;.......<...P..............@..B................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\m4VuyJtPKi.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):6.601524149173778
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:m4VuyJtPKi.exe
                                  File size:494'592 bytes
                                  MD5:43794e837b00b4da73a178e2fb0d3edd
                                  SHA1:fed7de621ea796de9dd649a8730ba3d0f152836a
                                  SHA256:2b57393b6c3bab50e5864dcb98bcfa3789c631bf7f88b1dab9d193faafba32c0
                                  SHA512:b270959d76200097a8e3020889ee6012dd7d26477b3b53d491d0f87b547d43c33acd9a6af77bb8ba988b01c0ffee0317c9e56d60996dfbb67358be1da3271e61
                                  SSDEEP:6144:oTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZXAXkcrWT4:oTlrYw1RUh3NFn+N5WfIQIjbs/ZXFT4
                                  TLSH:46B49E01BAD2C072D57514300D3AF776EAB8BD201835497B73EA1D5BFE31190A72AAB7
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~...~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..
                                  Icon Hash:95694d05214c1b33
                                  Entrypoint:0x434a80
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                  Time Stamp:0x66F18049 [Mon Sep 23 14:50:49 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:5
                                  OS Version Minor:1
                                  File Version Major:5
                                  File Version Minor:1
                                  Subsystem Version Major:5
                                  Subsystem Version Minor:1
                                  Import Hash:1389569a3a39186f3eb453b501cfe688
                                  Instruction
                                  call 00007F57D479FA9Bh
                                  jmp 00007F57D479F4E3h
                                  push ebp
                                  mov ebp, esp
                                  sub esp, 00000324h
                                  push ebx
                                  push esi
                                  push 00000017h
                                  call 00007F57D47C1D33h
                                  test eax, eax
                                  je 00007F57D479F657h
                                  mov ecx, dword ptr [ebp+08h]
                                  int 29h
                                  xor esi, esi
                                  lea eax, dword ptr [ebp-00000324h]
                                  push 000002CCh
                                  push esi
                                  push eax
                                  mov dword ptr [00471D14h], esi
                                  call 00007F57D47A1AA6h
                                  add esp, 0Ch
                                  mov dword ptr [ebp-00000274h], eax
                                  mov dword ptr [ebp-00000278h], ecx
                                  mov dword ptr [ebp-0000027Ch], edx
                                  mov dword ptr [ebp-00000280h], ebx
                                  mov dword ptr [ebp-00000284h], esi
                                  mov dword ptr [ebp-00000288h], edi
                                  mov word ptr [ebp-0000025Ch], ss
                                  mov word ptr [ebp-00000268h], cs
                                  mov word ptr [ebp-0000028Ch], ds
                                  mov word ptr [ebp-00000290h], es
                                  mov word ptr [ebp-00000294h], fs
                                  mov word ptr [ebp-00000298h], gs
                                  pushfd
                                  pop dword ptr [ebp-00000264h]
                                  mov eax, dword ptr [ebp+04h]
                                  mov dword ptr [ebp-0000026Ch], eax
                                  lea eax, dword ptr [ebp+04h]
                                  mov dword ptr [ebp-00000260h], eax
                                  mov dword ptr [ebp-00000324h], 00010001h
                                  mov eax, dword ptr [eax-04h]
                                  push 00000050h
                                  mov dword ptr [ebp-00000270h], eax
                                  lea eax, dword ptr [ebp-58h]
                                  push esi
                                  push eax
                                  call 00007F57D47A1A1Dh
                                  Programming Language:
                                  • [C++] VS2008 SP1 build 30729
                                  • [IMP] VS2008 SP1 build 30729
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x6eeb80x104.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x790000x4b4c.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x3bc8.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x6d3500x38.rdata
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x6d3e40x18.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6d3880x40.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x590000x500.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x571f50x57200e504ab64b98631753dc227346d757c52False0.5716379348995696data6.6273936921798455IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x590000x179dc0x17a0003563836e8ba6bd75dd82177f19b0089False0.5008370535714286data5.862029025853186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x710000x5d440xe000eaccffe1cb836994ce5d3ccfb22d4f9False0.22126116071428573data3.0035180736120775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .tls0x770000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .gfids0x780000x2300x4009ca325bce9f8c0342c0381814603584aFalse0.330078125data2.3999762503719224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .rsrc0x790000x4b4c0x4c00345d4f80e7bac5790a60b2198531b528False0.28387129934210525data3.9920238124855203IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x7e0000x3bc80x3c00047d13d1dd0f82094cdf10f08253441eFalse0.7640625data6.723768218094163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x7918c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                                  RT_ICON0x795f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                                  RT_ICON0x79f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                                  RT_ICON0x7b0240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                                  RT_RCDATA0x7d5cc0x53fdata1.0081906180193596
                                  RT_GROUP_ICON0x7db0c0x3edataEnglishUnited States0.8064516129032258
                                  DLLImport
                                  KERNEL32.dllFindNextFileA, ExpandEnvironmentStringsA, GetLongPathNameW, CopyFileW, GetLocaleInfoA, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, OpenMutexA, lstrcatW, GetCurrentProcessId, GetTempFileNameW, UnmapViewOfFile, DuplicateHandle, CreateFileMappingW, MapViewOfFile, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, FindFirstFileA, FormatMessageA, FindNextVolumeW, AllocConsole, lstrcmpW, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapReAlloc, GetACP, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, GetFileSize, TerminateThread, GetLastError, CreateDirectoryW, GetModuleHandleA, RemoveDirectoryW, MoveFileW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, SetFileAttributesW, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, GetModuleHandleW, ExitProcess, CreateMutexA, GetCurrentProcess, GetProcAddress, LoadLibraryA, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, SetConsoleOutputCP, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                                  USER32.dllGetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, CallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, DispatchMessageA, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible, CloseWindow, SendInput, EnumDisplaySettingsW, mouse_event, CreatePopupMenu, TranslateMessage, TrackPopupMenu, DefWindowProcA, CreateWindowExA, AppendMenuA, GetSystemMetrics, RegisterClassExA, GetCursorPos, SystemParametersInfoW, GetWindowThreadProcessId, MapVirtualKeyA, DrawIcon, GetIconInfo
                                  GDI32.dllBitBlt, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteObject, CreateDCA, GetObjectA, DeleteDC
                                  ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW, RegDeleteKeyA
                                  SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                                  ole32.dllCoInitializeEx, CoUninitialize, CoGetObject
                                  SHLWAPI.dllPathFileExistsW, PathFileExistsA, StrToIntA
                                  WINMM.dllwaveInOpen, waveInStart, waveInAddBuffer, PlaySoundW, mciSendStringA, mciSendStringW, waveInClose, waveInStop, waveInPrepareHeader, waveInUnprepareHeader
                                  WS2_32.dllgethostbyname, send, WSAStartup, closesocket, inet_ntoa, htons, htonl, getservbyname, ntohs, getservbyport, gethostbyaddr, inet_addr, WSASetLastError, WSAGetLastError, recv, connect, socket
                                  urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                                  gdiplus.dllGdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipAlloc, GdipCloneImage, GdipGetImageEncoders, GdiplusStartup, GdipLoadImageFromStream
                                  WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-11-06T07:44:04.839408+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54970646.175.167.1162404TCP
                                  2024-11-06T07:44:22.979602+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.549713TCP
                                  2024-11-06T07:45:02.071319+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.549942TCP
                                  2024-11-06T07:45:06.105028+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54996346.175.167.1162404TCP
                                  2024-11-06T07:46:06.026910+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54998646.175.167.1162404TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 6, 2024 07:44:03.877217054 CET497062404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:44:03.883059025 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:44:03.883160114 CET497062404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:44:03.889792919 CET497062404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:44:03.894593954 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:44:04.787930012 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:44:04.839407921 CET497062404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:44:04.943407059 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:44:04.947900057 CET497062404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:44:04.952789068 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:44:04.954353094 CET497062404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:44:04.959230900 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:44:04.959290981 CET497062404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:44:04.964270115 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:44:34.263607025 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:44:34.265276909 CET497062404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:44:34.270075083 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:45:04.147774935 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:45:04.147835970 CET497062404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:45:04.147933960 CET497062404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:45:04.152673960 CET24044970646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:45:05.152682066 CET499632404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:45:05.157468081 CET24044996346.175.167.116192.168.2.5
                                  Nov 6, 2024 07:45:05.157577038 CET499632404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:45:05.160845041 CET499632404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:45:05.165590048 CET24044996346.175.167.116192.168.2.5
                                  Nov 6, 2024 07:45:06.062743902 CET24044996346.175.167.116192.168.2.5
                                  Nov 6, 2024 07:45:06.105027914 CET499632404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:45:06.218075037 CET24044996346.175.167.116192.168.2.5
                                  Nov 6, 2024 07:45:06.222419977 CET499632404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:45:06.227220058 CET24044996346.175.167.116192.168.2.5
                                  Nov 6, 2024 07:45:06.227286100 CET499632404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:45:06.232131958 CET24044996346.175.167.116192.168.2.5
                                  Nov 6, 2024 07:45:34.281428099 CET24044996346.175.167.116192.168.2.5
                                  Nov 6, 2024 07:45:34.283261061 CET499632404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:45:34.287995100 CET24044996346.175.167.116192.168.2.5
                                  Nov 6, 2024 07:46:04.060276031 CET24044996346.175.167.116192.168.2.5
                                  Nov 6, 2024 07:46:04.060456991 CET499632404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:46:04.060600996 CET499632404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:46:04.065538883 CET24044996346.175.167.116192.168.2.5
                                  Nov 6, 2024 07:46:05.074744940 CET499862404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:46:05.079576969 CET24044998646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:46:05.079664946 CET499862404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:46:05.083134890 CET499862404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:46:05.087865114 CET24044998646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:46:05.976999044 CET24044998646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:46:06.026910067 CET499862404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:46:06.132349014 CET24044998646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:46:06.150207996 CET499862404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:46:06.155096054 CET24044998646.175.167.116192.168.2.5
                                  Nov 6, 2024 07:46:06.155174971 CET499862404192.168.2.546.175.167.116
                                  Nov 6, 2024 07:46:06.159977913 CET24044998646.175.167.116192.168.2.5

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:01:44:03
                                  Start date:06/11/2024
                                  Path:C:\Users\user\Desktop\m4VuyJtPKi.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\m4VuyJtPKi.exe"
                                  Imagebase:0x400000
                                  File size:494'592 bytes
                                  MD5 hash:43794E837B00B4DA73A178E2FB0D3EDD
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2069419897.000000000062E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2069419897.000000000062E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000000.2065494461.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000003.2068810165.00000000020C1000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000000.00000002.2070007784.0000000004800000.00000040.10000000.00040000.00000000.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:01:44:03
                                  Start date:06/11/2024
                                  Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  Wow64 process (32bit):true
                                  Commandline:"c:\program files (x86)\internet explorer\iexplore.exe"
                                  Imagebase:0x630000
                                  File size:828'368 bytes
                                  MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.3316238419.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.3316238419.0000000002AEB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Author: ditekSHen
                                  Reputation:moderate
                                  Has exited:false

                                  Target ID:3
                                  Start time:01:44:12
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\OpenWith.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\OpenWith.exe -Embedding
                                  Imagebase:0x7ff7656b0000
                                  File size:123'984 bytes
                                  MD5 hash:E4A834784FA08C17D47A1E72429C5109
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:01:44:20
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\OpenWith.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\OpenWith.exe -Embedding
                                  Imagebase:0x7ff7656b0000
                                  File size:123'984 bytes
                                  MD5 hash:E4A834784FA08C17D47A1E72429C5109
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:01:44:28
                                  Start date:06/11/2024
                                  Path:C:\Windows\System32\OpenWith.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\OpenWith.exe -Embedding
                                  Imagebase:0x7ff7656b0000
                                  File size:123'984 bytes
                                  MD5 hash:E4A834784FA08C17D47A1E72429C5109
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:3%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:32.1%
                                    Total number of Nodes:992
                                    Total number of Limit Nodes:38
                                    execution_graph 47041 4437fd 47042 443806 47041->47042 47043 44381f 47041->47043 47044 44380e 47042->47044 47048 443885 47042->47048 47046 443816 47046->47044 47059 443b52 22 API calls 2 library calls 47046->47059 47049 443891 47048->47049 47050 44388e 47048->47050 47060 44f45d GetEnvironmentStringsW 47049->47060 47050->47046 47055 4438d3 47055->47046 47056 4438a9 47068 446802 20 API calls __dosmaperr 47056->47068 47058 44389e 47069 446802 20 API calls __dosmaperr 47058->47069 47059->47043 47061 44f471 47060->47061 47062 443898 47060->47062 47070 4461b8 47061->47070 47062->47058 47067 4439aa 26 API calls 3 library calls 47062->47067 47065 44f485 ctype 47077 446802 20 API calls __dosmaperr 47065->47077 47066 44f49f FreeEnvironmentStringsW 47066->47062 47067->47056 47068->47058 47069->47055 47071 4461f6 47070->47071 47075 4461c6 __Getctype 47070->47075 47079 44062d 20 API calls _Atexit 47071->47079 47072 4461e1 RtlAllocateHeap 47074 4461f4 47072->47074 47072->47075 47074->47065 47075->47071 47075->47072 47078 443001 7 API calls 2 library calls 47075->47078 47077->47066 47078->47075 47079->47074 47080 43bea8 47083 43beb4 _swprintf ___BuildCatchObject 47080->47083 47081 43bec2 47096 44062d 20 API calls _Atexit 47081->47096 47083->47081 47084 43beec 47083->47084 47091 445909 EnterCriticalSection 47084->47091 47086 43bec7 ___BuildCatchObject __cftoe 47087 43bef7 47092 43bf98 47087->47092 47091->47087 47093 43bfa6 47092->47093 47095 43bf02 47093->47095 47098 4497ec 36 API calls 2 library calls 47093->47098 47097 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 47095->47097 47096->47086 47097->47086 47098->47093 47099 434918 47100 434924 ___BuildCatchObject 47099->47100 47125 434627 47100->47125 47102 43492b 47104 434954 47102->47104 47417 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 47102->47417 47113 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47104->47113 47418 4442d2 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47104->47418 47106 43496d 47108 434973 ___BuildCatchObject 47106->47108 47419 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47106->47419 47109 4349f3 47136 434ba5 47109->47136 47113->47109 47420 443487 35 API calls 5 library calls 47113->47420 47120 434a1f 47122 434a28 47120->47122 47421 443462 28 API calls _Atexit 47120->47421 47422 43479e 13 API calls 2 library calls 47122->47422 47126 434630 47125->47126 47423 434cb6 IsProcessorFeaturePresent 47126->47423 47128 43463c 47424 438fb1 10 API calls 4 library calls 47128->47424 47130 434641 47135 434645 47130->47135 47425 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47130->47425 47132 43464e 47133 43465c 47132->47133 47426 438fda 8 API calls 3 library calls 47132->47426 47133->47102 47135->47102 47427 436f10 47136->47427 47139 4349f9 47140 444223 47139->47140 47429 44f0d9 47140->47429 47142 434a02 47145 40ea00 47142->47145 47144 44422c 47144->47142 47433 446895 35 API calls 47144->47433 47435 41cbe1 LoadLibraryA GetProcAddress 47145->47435 47147 40ea1c GetModuleFileNameW 47440 40f3fe 47147->47440 47149 40ea38 47455 4020f6 47149->47455 47152 4020f6 28 API calls 47153 40ea56 47152->47153 47461 41beac 47153->47461 47157 40ea68 47487 401e8d 47157->47487 47159 40ea71 47160 40ea84 47159->47160 47161 40eace 47159->47161 47782 40fbee 116 API calls 47160->47782 47493 401e65 47161->47493 47164 40eade 47168 401e65 22 API calls 47164->47168 47165 40ea96 47166 401e65 22 API calls 47165->47166 47167 40eaa2 47166->47167 47783 410f72 36 API calls __EH_prolog 47167->47783 47169 40eafd 47168->47169 47498 40531e 47169->47498 47172 40eb0c 47503 406383 47172->47503 47173 40eab4 47784 40fb9f 77 API calls 47173->47784 47177 40eabd 47785 40f3eb 70 API calls 47177->47785 47183 401fd8 11 API calls 47184 40ef36 47183->47184 47412 443396 GetModuleHandleW 47184->47412 47185 401fd8 11 API calls 47186 40eb36 47185->47186 47187 401e65 22 API calls 47186->47187 47188 40eb3f 47187->47188 47520 401fc0 47188->47520 47190 40eb4a 47191 401e65 22 API calls 47190->47191 47192 40eb63 47191->47192 47193 401e65 22 API calls 47192->47193 47194 40eb7e 47193->47194 47195 40ebe9 47194->47195 47786 406c59 28 API calls 47194->47786 47196 401e65 22 API calls 47195->47196 47202 40ebf6 47196->47202 47198 40ebab 47199 401fe2 28 API calls 47198->47199 47200 40ebb7 47199->47200 47201 401fd8 11 API calls 47200->47201 47204 40ebc0 47201->47204 47203 40ec3d 47202->47203 47524 413584 RegOpenKeyExA 47202->47524 47527 40d0a4 47203->47527 47209 413584 3 API calls 47204->47209 47206 40ec43 47208 40eac6 47206->47208 47530 41b354 47206->47530 47208->47183 47211 40ebdf 47209->47211 47211->47195 47213 40f38a 47211->47213 47212 40ec5e 47215 40ecb1 47212->47215 47547 407751 47212->47547 47828 4139e4 30 API calls 47213->47828 47214 40ec21 47214->47203 47787 4139e4 30 API calls 47214->47787 47217 401e65 22 API calls 47215->47217 47220 40ecba 47217->47220 47230 40ecc6 47220->47230 47231 40eccb 47220->47231 47222 40f3a0 47829 4124b0 65 API calls ___scrt_get_show_window_mode 47222->47829 47223 40ec87 47228 401e65 22 API calls 47223->47228 47224 40ec7d 47788 407773 30 API calls 47224->47788 47226 40f388 47229 41bcef 28 API calls 47226->47229 47239 40ec90 47228->47239 47233 40f3ba 47229->47233 47791 407790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 47230->47791 47236 401e65 22 API calls 47231->47236 47232 40ec82 47789 40729b 97 API calls 47232->47789 47830 413a5e RegOpenKeyExW RegDeleteValueW 47233->47830 47237 40ecd4 47236->47237 47551 41bcef 47237->47551 47239->47215 47243 40ecac 47239->47243 47240 40ecdf 47555 401f13 47240->47555 47790 40729b 97 API calls 47243->47790 47244 40f3cd 47247 401f09 11 API calls 47244->47247 47249 40f3d7 47247->47249 47251 401f09 11 API calls 47249->47251 47253 40f3e0 47251->47253 47252 401e65 22 API calls 47254 40ecfc 47252->47254 47831 40dd7d 27 API calls 47253->47831 47258 401e65 22 API calls 47254->47258 47256 40f3e5 47832 414f65 169 API calls _strftime 47256->47832 47260 40ed16 47258->47260 47261 401e65 22 API calls 47260->47261 47262 40ed30 47261->47262 47263 401e65 22 API calls 47262->47263 47264 40ed49 47263->47264 47265 40edb6 47264->47265 47266 401e65 22 API calls 47264->47266 47267 40edc5 47265->47267 47272 40ef41 ___scrt_get_show_window_mode 47265->47272 47270 40ed5e _wcslen 47266->47270 47268 401e65 22 API calls 47267->47268 47294 40ee45 ___scrt_get_show_window_mode 47267->47294 47269 40edd7 47268->47269 47271 401e65 22 API calls 47269->47271 47270->47265 47274 401e65 22 API calls 47270->47274 47273 40ede9 47271->47273 47792 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47272->47792 47277 401e65 22 API calls 47273->47277 47275 40ed79 47274->47275 47278 401e65 22 API calls 47275->47278 47279 40edfb 47277->47279 47280 40ed8e 47278->47280 47282 401e65 22 API calls 47279->47282 47567 40da6f 47280->47567 47281 40ef8c 47283 401e65 22 API calls 47281->47283 47286 40ee24 47282->47286 47284 40efb1 47283->47284 47793 402093 47284->47793 47291 401e65 22 API calls 47286->47291 47288 401f13 28 API calls 47290 40edad 47288->47290 47295 401f09 11 API calls 47290->47295 47292 40ee35 47291->47292 47625 40ce34 47292->47625 47293 40efc3 47799 4137aa RegCreateKeyA 47293->47799 47694 413982 47294->47694 47295->47265 47300 40eede ctype 47303 401e65 22 API calls 47300->47303 47301 401e65 22 API calls 47302 40efe5 47301->47302 47805 43bb2c 39 API calls _strftime 47302->47805 47306 40eef5 47303->47306 47305 40eff2 47308 40f01f 47305->47308 47806 41ce2c 87 API calls ___scrt_get_show_window_mode 47305->47806 47306->47281 47309 401e65 22 API calls 47306->47309 47313 402093 28 API calls 47308->47313 47311 40ef12 47309->47311 47314 41bcef 28 API calls 47311->47314 47312 40f003 CreateThread 47312->47308 48213 41d4ee 10 API calls 47312->48213 47315 40f034 47313->47315 47316 40ef1e 47314->47316 47317 402093 28 API calls 47315->47317 47704 40f4af GetModuleFileNameW 47316->47704 47319 40f043 47317->47319 47807 41b580 79 API calls 47319->47807 47322 40f048 47323 401e65 22 API calls 47322->47323 47324 40f054 47323->47324 47325 401e65 22 API calls 47324->47325 47326 40f066 47325->47326 47327 401e65 22 API calls 47326->47327 47328 40f086 47327->47328 47808 43bb2c 39 API calls _strftime 47328->47808 47330 40f093 47331 401e65 22 API calls 47330->47331 47332 40f09e 47331->47332 47333 401e65 22 API calls 47332->47333 47334 40f0af 47333->47334 47335 401e65 22 API calls 47334->47335 47336 40f0c4 47335->47336 47337 401e65 22 API calls 47336->47337 47338 40f0d5 47337->47338 47339 40f0dc StrToIntA 47338->47339 47809 409e1f 171 API calls _wcslen 47339->47809 47341 40f0ee 47342 401e65 22 API calls 47341->47342 47343 40f0f7 47342->47343 47344 40f13c 47343->47344 47810 43455e 47343->47810 47347 401e65 22 API calls 47344->47347 47352 40f14c 47347->47352 47348 401e65 22 API calls 47349 40f11f 47348->47349 47350 40f126 CreateThread 47349->47350 47350->47344 48216 41a045 109 API calls 2 library calls 47350->48216 47351 40f194 47353 401e65 22 API calls 47351->47353 47352->47351 47354 43455e new 22 API calls 47352->47354 47359 40f19d 47353->47359 47355 40f161 47354->47355 47356 401e65 22 API calls 47355->47356 47357 40f173 47356->47357 47360 40f17a CreateThread 47357->47360 47358 40f207 47361 401e65 22 API calls 47358->47361 47359->47358 47362 401e65 22 API calls 47359->47362 47360->47351 48214 41a045 109 API calls 2 library calls 47360->48214 47365 40f210 47361->47365 47363 40f1b9 47362->47363 47366 401e65 22 API calls 47363->47366 47364 40f255 47820 41b69e 80 API calls 47364->47820 47365->47364 47369 401e65 22 API calls 47365->47369 47367 40f1ce 47366->47367 47817 40da23 32 API calls 47367->47817 47370 40f225 47369->47370 47375 401e65 22 API calls 47370->47375 47371 40f25e 47372 401f13 28 API calls 47371->47372 47374 40f269 47372->47374 47377 401f09 11 API calls 47374->47377 47379 40f23a 47375->47379 47376 40f1e1 47380 401f13 28 API calls 47376->47380 47378 40f272 CreateThread 47377->47378 47383 40f293 CreateThread 47378->47383 47384 40f29f 47378->47384 48215 40f7e2 120 API calls 47378->48215 47818 43bb2c 39 API calls _strftime 47379->47818 47382 40f1ed 47380->47382 47385 401f09 11 API calls 47382->47385 47383->47384 48217 412132 145 API calls 47383->48217 47386 40f2b4 47384->47386 47387 40f2a8 CreateThread 47384->47387 47389 40f1f6 CreateThread 47385->47389 47391 40f307 47386->47391 47393 402093 28 API calls 47386->47393 47387->47386 48218 412716 38 API calls ___scrt_get_show_window_mode 47387->48218 47389->47358 48219 401be9 49 API calls _strftime 47389->48219 47390 40f247 47819 40c19d 7 API calls 47390->47819 47822 41353a RegOpenKeyExA RegQueryValueExA RegCloseKey 47391->47822 47394 40f2d7 47393->47394 47821 4052fd 28 API calls 47394->47821 47397 40f31f 47397->47253 47401 41bcef 28 API calls 47397->47401 47403 40f338 47401->47403 47823 413656 RegOpenKeyExW 47403->47823 47408 401f09 11 API calls 47410 40f359 47408->47410 47409 40f381 DeleteFileW 47409->47226 47409->47410 47410->47226 47410->47409 47411 40f36f Sleep 47410->47411 47411->47410 47413 434a15 47412->47413 47413->47120 47414 4434bf 47413->47414 48221 44323c 47414->48221 47417->47102 47418->47106 47419->47113 47420->47109 47421->47122 47422->47108 47423->47128 47424->47130 47425->47132 47426->47135 47428 434bb8 GetStartupInfoW 47427->47428 47428->47139 47430 44f0eb 47429->47430 47431 44f0e2 47429->47431 47430->47144 47434 44efd8 48 API calls 5 library calls 47431->47434 47433->47144 47434->47430 47436 41cc20 LoadLibraryA GetProcAddress 47435->47436 47437 41cc10 GetModuleHandleA GetProcAddress 47435->47437 47438 41cc49 44 API calls 47436->47438 47439 41cc39 LoadLibraryA GetProcAddress 47436->47439 47437->47436 47438->47147 47439->47438 47833 41b539 FindResourceA 47440->47833 47444 40f428 ctype 47843 4020b7 47444->47843 47447 401fe2 28 API calls 47448 40f44e 47447->47448 47449 401fd8 11 API calls 47448->47449 47450 40f457 47449->47450 47451 43bda0 ___std_exception_copy 21 API calls 47450->47451 47452 40f468 ctype 47451->47452 47849 406e13 47452->47849 47454 40f49b 47454->47149 47456 40210c 47455->47456 47457 4023ce 11 API calls 47456->47457 47458 402126 47457->47458 47459 402569 28 API calls 47458->47459 47460 402134 47459->47460 47460->47152 47903 4020df 47461->47903 47463 401fd8 11 API calls 47464 41bf61 47463->47464 47466 401fd8 11 API calls 47464->47466 47465 41bf31 47909 4041a2 28 API calls 47465->47909 47469 41bf69 47466->47469 47472 401fd8 11 API calls 47469->47472 47470 41bf3d 47473 401fe2 28 API calls 47470->47473 47471 41bebf 47471->47465 47474 401fe2 28 API calls 47471->47474 47478 401fd8 11 API calls 47471->47478 47482 41bf2f 47471->47482 47907 4041a2 28 API calls 47471->47907 47908 41cec5 28 API calls 47471->47908 47475 40ea5f 47472->47475 47476 41bf46 47473->47476 47474->47471 47483 40fb52 47475->47483 47477 401fd8 11 API calls 47476->47477 47479 41bf4e 47477->47479 47478->47471 47910 41cec5 28 API calls 47479->47910 47482->47463 47484 40fb5e 47483->47484 47486 40fb65 47483->47486 47911 402163 11 API calls 47484->47911 47486->47157 47488 402163 47487->47488 47492 40219f 47488->47492 47912 402730 11 API calls 47488->47912 47490 402184 47913 402712 11 API calls std::_Deallocate 47490->47913 47492->47159 47494 401e6d 47493->47494 47495 401e75 47494->47495 47914 402158 22 API calls 47494->47914 47495->47164 47499 4020df 11 API calls 47498->47499 47500 40532a 47499->47500 47915 4032a0 47500->47915 47502 405346 47502->47172 47919 4051ef 47503->47919 47505 406391 47923 402055 47505->47923 47508 401fe2 47509 401ff1 47508->47509 47516 402039 47508->47516 47510 4023ce 11 API calls 47509->47510 47511 401ffa 47510->47511 47512 40203c 47511->47512 47513 402015 47511->47513 47514 40267a 11 API calls 47512->47514 47938 403098 28 API calls 47513->47938 47514->47516 47517 401fd8 47516->47517 47518 4023ce 11 API calls 47517->47518 47519 401fe1 47518->47519 47519->47185 47521 401fd2 47520->47521 47522 401fc9 47520->47522 47521->47190 47939 4025e0 28 API calls 47522->47939 47525 4135db 47524->47525 47526 4135ae RegQueryValueExA RegCloseKey 47524->47526 47525->47214 47526->47525 47940 401fab 47527->47940 47529 40d0ae CreateMutexA GetLastError 47529->47206 47941 41c048 47530->47941 47535 401fe2 28 API calls 47536 41b390 47535->47536 47537 401fd8 11 API calls 47536->47537 47538 41b398 47537->47538 47539 4135e1 31 API calls 47538->47539 47541 41b3ee 47538->47541 47540 41b3c1 47539->47540 47542 41b3cc StrToIntA 47540->47542 47541->47212 47543 41b3e3 47542->47543 47544 41b3da 47542->47544 47546 401fd8 11 API calls 47543->47546 47950 41cffa 22 API calls 47544->47950 47546->47541 47548 407765 47547->47548 47549 413584 3 API calls 47548->47549 47550 40776c 47549->47550 47550->47223 47550->47224 47552 41bd03 47551->47552 47951 40b93f 47552->47951 47554 41bd0b 47554->47240 47556 401f22 47555->47556 47557 401f6a 47555->47557 47558 402252 11 API calls 47556->47558 47564 401f09 47557->47564 47559 401f2b 47558->47559 47560 401f6d 47559->47560 47561 401f46 47559->47561 47984 402336 47560->47984 47983 40305c 28 API calls 47561->47983 47565 402252 11 API calls 47564->47565 47566 401f12 47565->47566 47566->47252 47988 401f86 47567->47988 47570 40dae0 47574 41c048 2 API calls 47570->47574 47571 40daab 47998 41b645 29 API calls 47571->47998 47573 40dbd4 GetLongPathNameW 47577 40417e 28 API calls 47573->47577 47575 40dae5 47574->47575 47578 40dae9 47575->47578 47579 40db3b 47575->47579 47576 40dab4 47581 401f13 28 API calls 47576->47581 47582 40dbe9 47577->47582 47584 40417e 28 API calls 47578->47584 47992 40417e 47579->47992 47580 40daa1 47580->47573 47585 40dabe 47581->47585 47586 40417e 28 API calls 47582->47586 47589 40daf7 47584->47589 47591 401f09 11 API calls 47585->47591 47587 40dbf8 47586->47587 48001 40de0c 28 API calls 47587->48001 47588 40db49 47594 40417e 28 API calls 47588->47594 47595 40417e 28 API calls 47589->47595 47591->47580 47592 40dc0b 48002 402fa5 28 API calls 47592->48002 47597 40db5f 47594->47597 47598 40db0d 47595->47598 47596 40dc16 48003 402fa5 28 API calls 47596->48003 48000 402fa5 28 API calls 47597->48000 47999 402fa5 28 API calls 47598->47999 47602 40dc20 47605 401f09 11 API calls 47602->47605 47603 40db6a 47606 401f13 28 API calls 47603->47606 47604 40db18 47607 401f13 28 API calls 47604->47607 47608 40dc2a 47605->47608 47609 40db75 47606->47609 47610 40db23 47607->47610 47611 401f09 11 API calls 47608->47611 47612 401f09 11 API calls 47609->47612 47613 401f09 11 API calls 47610->47613 47614 40dc33 47611->47614 47615 40db7e 47612->47615 47616 40db2c 47613->47616 47617 401f09 11 API calls 47614->47617 47618 401f09 11 API calls 47615->47618 47619 401f09 11 API calls 47616->47619 47620 40dc3c 47617->47620 47618->47585 47619->47585 47621 401f09 11 API calls 47620->47621 47622 40dc45 47621->47622 47623 401f09 11 API calls 47622->47623 47624 40dc4e 47623->47624 47624->47288 47626 40ce47 _wcslen 47625->47626 47627 40ce51 47626->47627 47628 40ce9b 47626->47628 47631 40ce5a CreateDirectoryW 47627->47631 47629 40da6f 32 API calls 47628->47629 47630 40cead 47629->47630 47632 401f13 28 API calls 47630->47632 48016 409196 47631->48016 47634 40ce99 47632->47634 47636 401f09 11 API calls 47634->47636 47635 40ce76 48050 403014 47635->48050 47642 40cec4 47636->47642 47639 401f13 28 API calls 47640 40ce90 47639->47640 47641 401f09 11 API calls 47640->47641 47641->47634 47643 40cefa 47642->47643 47644 40cedd 47642->47644 47645 40cf03 CopyFileW 47643->47645 47646 40cd48 31 API calls 47644->47646 47647 40cfd4 47645->47647 47649 40cf15 _wcslen 47645->47649 47648 40ceee 47646->47648 48023 40cd48 47647->48023 47648->47294 47649->47647 47651 40cf31 47649->47651 47652 40cf84 47649->47652 47654 40da6f 32 API calls 47651->47654 47653 40da6f 32 API calls 47652->47653 47658 40cf8a 47653->47658 47659 40cf37 47654->47659 47655 40d01a 47657 40d062 CloseHandle 47655->47657 47662 40417e 28 API calls 47655->47662 47656 40cfe5 47656->47655 47660 40cff7 SetFileAttributesW 47656->47660 48049 401f04 47657->48049 47663 401f13 28 API calls 47658->47663 47664 401f13 28 API calls 47659->47664 47679 40d006 _wcslen 47660->47679 47667 40d030 47662->47667 47668 40cf7e 47663->47668 47665 40cf43 47664->47665 47669 401f09 11 API calls 47665->47669 47666 40d07e ShellExecuteW 47670 40d091 47666->47670 47671 40d09b ExitProcess 47666->47671 47672 41bcef 28 API calls 47667->47672 47673 401f09 11 API calls 47668->47673 47674 40cf4c 47669->47674 47675 40d0a4 CreateMutexA GetLastError 47670->47675 47676 40d043 47672->47676 47677 40cf9c 47673->47677 47678 409196 28 API calls 47674->47678 47675->47648 48056 41384f RegCreateKeyW 47676->48056 47682 40cfa8 CreateDirectoryW 47677->47682 47680 40cf60 47678->47680 47679->47655 47681 40d017 SetFileAttributesW 47679->47681 47683 403014 28 API calls 47680->47683 47681->47655 48055 401f04 47682->48055 47687 40cf6c 47683->47687 47690 401f13 28 API calls 47687->47690 47688 401f09 11 API calls 47688->47657 47692 40cf75 47690->47692 47693 401f09 11 API calls 47692->47693 47693->47668 47695 4139a0 47694->47695 47696 406e13 28 API calls 47695->47696 47697 4139b5 47696->47697 47698 4020f6 28 API calls 47697->47698 47699 4139c5 47698->47699 47700 4137aa 14 API calls 47699->47700 47701 4139cf 47700->47701 47702 401fd8 11 API calls 47701->47702 47703 4139dc 47702->47703 47703->47300 47705 40f4e0 47704->47705 47706 40f669 47705->47706 47707 401f86 11 API calls 47705->47707 48118 41b71b 47706->48118 47709 40f4f1 CreateToolhelp32Snapshot Process32FirstW 47707->47709 47712 40f586 Process32NextW 47709->47712 47711 401f13 28 API calls 47713 40f67f 47711->47713 47714 40f59d CloseHandle 47712->47714 47731 40f518 47712->47731 47715 401f09 11 API calls 47713->47715 47717 40f5b2 47714->47717 47718 40f688 47715->47718 47716 40417e 28 API calls 47716->47731 47719 40f660 47717->47719 47720 40f5be 47717->47720 47723 40f6a3 CloseHandle 47718->47723 47724 40f611 47718->47724 47721 401f09 11 API calls 47719->47721 47722 401f09 11 API calls 47720->47722 47721->47706 47725 40f5c3 47722->47725 47726 4020df 11 API calls 47723->47726 47727 401f09 11 API calls 47724->47727 47725->47723 47728 40f6b8 47726->47728 47729 40ef23 47727->47729 48141 41c516 CreateFileW 47728->48141 47729->47208 47729->47281 47731->47716 47732 40f5c8 47731->47732 47734 401f09 11 API calls 47731->47734 48109 41c26e OpenProcess 47732->48109 47734->47712 47735 40f6cd 48149 4185a3 47735->48149 47738 401f13 28 API calls 47740 40f5e2 47738->47740 47739 40f6ed 47741 40f7a2 47739->47741 47743 40417e 28 API calls 47739->47743 47742 401f09 11 API calls 47740->47742 48152 4138b2 RegCreateKeyA 47741->48152 47744 40f5eb 47742->47744 47745 40f707 47743->47745 47747 40f616 47744->47747 47748 40f5ff 47744->47748 47749 409196 28 API calls 47745->47749 47754 40f657 47747->47754 47755 40f628 47747->47755 47750 401f09 11 API calls 47748->47750 47752 40f724 47749->47752 47753 40f608 47750->47753 47751 401fd8 11 API calls 47751->47724 47760 4185a3 31 API calls 47752->47760 47756 401f09 11 API calls 47753->47756 47758 401f09 11 API calls 47754->47758 48155 41c076 OpenProcess IsWow64Process 47755->48155 47756->47724 47758->47719 47759 40f634 47759->47754 47761 40f638 47759->47761 47762 40f735 47760->47762 48156 40b9a7 28 API calls 47761->48156 47764 401f09 11 API calls 47762->47764 47770 40f742 47764->47770 47765 40f649 47767 401f09 11 API calls 47765->47767 47766 40f799 47768 401f09 11 API calls 47766->47768 47769 40f652 47767->47769 47768->47741 47769->47714 47770->47766 47771 409196 28 API calls 47770->47771 47772 40f765 47771->47772 47773 4185a3 31 API calls 47772->47773 47774 40f776 47773->47774 47775 401f09 11 API calls 47774->47775 47776 40f783 47775->47776 47776->47766 47777 40f789 47776->47777 47778 40d0a4 2 API calls 47777->47778 47779 40f78e 47778->47779 47780 401f09 11 API calls 47779->47780 47781 40f797 47780->47781 47781->47751 47782->47165 47783->47173 47784->47177 47786->47198 47787->47203 47788->47232 47789->47223 47790->47215 47791->47231 47792->47281 47794 40209b 47793->47794 47795 4023ce 11 API calls 47794->47795 47796 4020a6 47795->47796 48205 4024ed 47796->48205 47800 4137fa 47799->47800 47803 4137c3 47799->47803 47801 401fd8 11 API calls 47800->47801 47802 40efd9 47801->47802 47802->47301 47804 4137d5 RegSetValueExA RegCloseKey 47803->47804 47804->47800 47805->47305 47806->47312 47807->47322 47808->47330 47809->47341 47814 434563 47810->47814 47811 43bda0 ___std_exception_copy 21 API calls 47811->47814 47812 40f10c 47812->47348 47814->47811 47814->47812 48209 443001 7 API calls 2 library calls 47814->48209 48210 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47814->48210 48211 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47814->48211 47817->47376 47818->47390 47819->47364 47820->47371 47822->47397 47824 413682 RegQueryValueExW RegCloseKey 47823->47824 47825 4136af 47823->47825 47824->47825 47826 40417e 28 API calls 47825->47826 47827 40f34e 47826->47827 47827->47408 47828->47222 47830->47244 47831->47256 48212 41ada8 105 API calls 47832->48212 47834 41b556 LoadResource LockResource SizeofResource 47833->47834 47835 40f419 47833->47835 47834->47835 47836 43bda0 47835->47836 47841 4461b8 __Getctype 47836->47841 47837 4461f6 47853 44062d 20 API calls _Atexit 47837->47853 47838 4461e1 RtlAllocateHeap 47840 4461f4 47838->47840 47838->47841 47840->47444 47841->47837 47841->47838 47852 443001 7 API calls 2 library calls 47841->47852 47844 4020bf 47843->47844 47854 4023ce 47844->47854 47846 4020ca 47858 40250a 47846->47858 47848 4020d9 47848->47447 47850 4020b7 28 API calls 47849->47850 47851 406e27 47850->47851 47851->47454 47852->47841 47853->47840 47855 4023d8 47854->47855 47856 402428 47854->47856 47855->47856 47865 4027a7 11 API calls std::_Deallocate 47855->47865 47856->47846 47859 40251a 47858->47859 47860 402520 47859->47860 47861 402535 47859->47861 47866 402569 47860->47866 47876 4028e8 47861->47876 47864 402533 47864->47848 47865->47856 47887 402888 47866->47887 47868 40257d 47869 402592 47868->47869 47870 4025a7 47868->47870 47892 402a34 22 API calls 47869->47892 47872 4028e8 28 API calls 47870->47872 47875 4025a5 47872->47875 47873 40259b 47893 4029da 22 API calls 47873->47893 47875->47864 47877 4028f1 47876->47877 47878 402953 47877->47878 47879 4028fb 47877->47879 47901 4028a4 22 API calls 47878->47901 47882 402904 47879->47882 47883 402917 47879->47883 47895 402cae 47882->47895 47885 402915 47883->47885 47886 4023ce 11 API calls 47883->47886 47885->47864 47886->47885 47889 402890 47887->47889 47888 402898 47888->47868 47889->47888 47894 402ca3 22 API calls 47889->47894 47892->47873 47893->47875 47896 402cb8 __EH_prolog 47895->47896 47902 402e54 22 API calls 47896->47902 47898 4023ce 11 API calls 47900 402d92 47898->47900 47899 402d24 47899->47898 47900->47885 47902->47899 47904 4020e7 47903->47904 47905 4023ce 11 API calls 47904->47905 47906 4020f2 47905->47906 47906->47471 47907->47471 47908->47471 47909->47470 47910->47482 47911->47486 47912->47490 47913->47492 47916 4032aa 47915->47916 47917 4028e8 28 API calls 47916->47917 47918 4032c9 47916->47918 47917->47918 47918->47502 47920 4051fb 47919->47920 47929 405274 47920->47929 47922 405208 47922->47505 47924 402061 47923->47924 47925 4023ce 11 API calls 47924->47925 47926 40207b 47925->47926 47934 40267a 47926->47934 47930 405282 47929->47930 47933 4028a4 22 API calls 47930->47933 47935 40268b 47934->47935 47936 4023ce 11 API calls 47935->47936 47937 40208d 47936->47937 47937->47508 47938->47516 47939->47521 47942 41b362 47941->47942 47943 41c055 GetCurrentProcess IsWow64Process 47941->47943 47945 4135e1 RegOpenKeyExA 47942->47945 47943->47942 47944 41c06c 47943->47944 47944->47942 47946 41360f RegQueryValueExA RegCloseKey 47945->47946 47947 413639 47945->47947 47946->47947 47948 402093 28 API calls 47947->47948 47949 41364e 47948->47949 47949->47535 47950->47543 47952 40b947 47951->47952 47957 402252 47952->47957 47954 40b952 47961 40b967 47954->47961 47956 40b961 47956->47554 47958 4022ac 47957->47958 47959 40225c 47957->47959 47958->47954 47959->47958 47968 402779 11 API calls std::_Deallocate 47959->47968 47962 40b9a1 47961->47962 47963 40b973 47961->47963 47980 4028a4 22 API calls 47962->47980 47969 4027e6 47963->47969 47967 40b97d 47967->47956 47968->47958 47970 4027ef 47969->47970 47971 402851 47970->47971 47972 4027f9 47970->47972 47982 4028a4 22 API calls 47971->47982 47975 402802 47972->47975 47977 402815 47972->47977 47981 402aea 28 API calls __EH_prolog 47975->47981 47978 402813 47977->47978 47979 402252 11 API calls 47977->47979 47978->47967 47979->47978 47981->47978 47983->47557 47985 402347 47984->47985 47986 402252 11 API calls 47985->47986 47987 4023c7 47986->47987 47987->47557 47989 401f8e 47988->47989 47990 402252 11 API calls 47989->47990 47991 401f99 47990->47991 47991->47570 47991->47571 47991->47580 47993 404186 47992->47993 47994 402252 11 API calls 47993->47994 47995 404191 47994->47995 48004 4041bc 47995->48004 47998->47576 47999->47604 48000->47603 48001->47592 48002->47596 48003->47602 48005 4041c8 48004->48005 48008 4041d9 48005->48008 48007 40419c 48007->47588 48009 4041e9 48008->48009 48010 404206 48009->48010 48011 4041ef 48009->48011 48012 4027e6 28 API calls 48010->48012 48015 404267 28 API calls 48011->48015 48014 404204 48012->48014 48014->48007 48015->48014 48017 401f86 11 API calls 48016->48017 48018 4091a2 48017->48018 48062 40314c 48018->48062 48020 4091bf 48066 40325d 48020->48066 48022 4091c7 48022->47635 48024 40cdaa 48023->48024 48025 40cd6e 48023->48025 48027 40cdeb 48024->48027 48030 40b9b7 28 API calls 48024->48030 48080 40b9b7 48025->48080 48029 40ce2c 48027->48029 48033 40b9b7 28 API calls 48027->48033 48029->47656 48031 40cdc1 48030->48031 48034 403014 28 API calls 48031->48034 48032 403014 28 API calls 48035 40cd8a 48032->48035 48036 40ce02 48033->48036 48037 40cdcb 48034->48037 48038 41384f 14 API calls 48035->48038 48039 403014 28 API calls 48036->48039 48040 41384f 14 API calls 48037->48040 48041 40cd9e 48038->48041 48042 40ce0c 48039->48042 48043 40cddf 48040->48043 48044 401f09 11 API calls 48041->48044 48045 41384f 14 API calls 48042->48045 48046 401f09 11 API calls 48043->48046 48044->48024 48047 40ce20 48045->48047 48046->48027 48048 401f09 11 API calls 48047->48048 48048->48029 48087 403222 48050->48087 48052 403022 48091 403262 48052->48091 48057 4138a1 48056->48057 48060 413864 48056->48060 48058 401f09 11 API calls 48057->48058 48059 40d056 48058->48059 48059->47688 48061 41387d RegSetValueExW RegCloseKey 48060->48061 48061->48057 48063 403156 48062->48063 48064 4027e6 28 API calls 48063->48064 48065 403175 48063->48065 48064->48065 48065->48020 48067 40323f 48066->48067 48070 4036a6 48067->48070 48069 40324c 48069->48022 48071 402888 22 API calls 48070->48071 48072 4036b9 48071->48072 48073 40372c 48072->48073 48074 4036de 48072->48074 48079 4028a4 22 API calls 48073->48079 48077 4027e6 28 API calls 48074->48077 48078 4036f0 48074->48078 48077->48078 48078->48069 48081 401f86 11 API calls 48080->48081 48082 40b9c3 48081->48082 48083 40314c 28 API calls 48082->48083 48084 40b9df 48083->48084 48085 40325d 28 API calls 48084->48085 48086 40b9f2 48085->48086 48086->48032 48088 40322e 48087->48088 48097 403618 48088->48097 48090 40323b 48090->48052 48092 40326e 48091->48092 48093 402252 11 API calls 48092->48093 48094 403288 48093->48094 48095 402336 11 API calls 48094->48095 48096 403031 48095->48096 48096->47639 48098 403626 48097->48098 48099 403644 48098->48099 48100 40362c 48098->48100 48101 40365c 48099->48101 48102 40369e 48099->48102 48103 4036a6 28 API calls 48100->48103 48106 4027e6 28 API calls 48101->48106 48107 403642 48101->48107 48108 4028a4 22 API calls 48102->48108 48103->48107 48106->48107 48107->48090 48110 41c292 OpenProcess 48109->48110 48111 41c2ac K32GetProcessImageFileNameW 48109->48111 48110->48111 48112 41c2a5 48110->48112 48113 41c2c4 CloseHandle 48111->48113 48114 41c2cc CloseHandle 48111->48114 48116 40417e 28 API calls 48112->48116 48113->48112 48157 41c0ac lstrlenW 48114->48157 48117 40f5d8 48116->48117 48117->47738 48119 413656 31 API calls 48118->48119 48120 41b737 48119->48120 48174 445825 37 API calls 2 library calls 48120->48174 48122 41b746 48175 409049 28 API calls 48122->48175 48124 41b763 48125 401f13 28 API calls 48124->48125 48126 41b76b 48125->48126 48127 401f09 11 API calls 48126->48127 48128 41b773 48127->48128 48176 409097 28 API calls 48128->48176 48130 41b77e 48177 41bdd3 28 API calls 48130->48177 48132 41b787 48133 401f13 28 API calls 48132->48133 48134 41b792 48133->48134 48135 401f09 11 API calls 48134->48135 48136 41b79a 48135->48136 48137 41c048 2 API calls 48136->48137 48138 41b7d5 _wcslen 48137->48138 48139 40f672 48138->48139 48178 41cfd5 28 API calls 48138->48178 48139->47711 48142 41c540 GetFileSize 48141->48142 48143 41c53c 48141->48143 48179 40244e 48142->48179 48143->47735 48145 41c554 48146 41c566 ReadFile 48145->48146 48147 41c573 48146->48147 48148 41c575 CloseHandle 48146->48148 48147->48148 48148->48143 48184 41812a 48149->48184 48153 4138f4 48152->48153 48154 4138ca RegSetValueExA RegCloseKey 48152->48154 48153->47781 48154->48153 48155->47759 48156->47765 48158 41c0d1 _memcmp 48157->48158 48163 41c108 ctype 48157->48163 48161 41c0f1 lstrlenW 48158->48161 48158->48163 48159 41c126 FindFirstVolumeW 48160 41c146 GetLastError 48159->48160 48164 41c153 _wcslen 48159->48164 48162 41c1f9 48160->48162 48161->48158 48161->48163 48162->48112 48163->48159 48165 41c1e3 48164->48165 48167 41c174 QueryDosDeviceW 48164->48167 48166 41c1e8 FindVolumeClose 48165->48166 48166->48162 48168 41c261 GetLastError 48167->48168 48169 41c19c lstrcmpW 48167->48169 48168->48166 48170 41c213 GetVolumePathNamesForVolumeNameW 48169->48170 48171 41c1af FindNextVolumeW 48169->48171 48170->48168 48173 41c23b lstrcatW lstrcpyW 48170->48173 48171->48164 48172 41c204 GetLastError 48171->48172 48172->48165 48172->48166 48173->48166 48174->48122 48175->48124 48176->48130 48177->48132 48178->48139 48180 402456 48179->48180 48182 402460 48180->48182 48183 402a51 28 API calls 48180->48183 48182->48145 48183->48182 48185 418157 8 API calls 48184->48185 48186 41847b CloseHandle CloseHandle 48185->48186 48187 4181c4 ___scrt_get_show_window_mode 48185->48187 48186->47739 48187->48186 48188 41822a CreateProcessW 48187->48188 48189 418260 VirtualAlloc Wow64GetThreadContext 48188->48189 48190 4184b5 GetLastError 48188->48190 48191 41847f VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 48189->48191 48192 41828e ReadProcessMemory 48189->48192 48190->48186 48191->48186 48192->48191 48193 4182b4 NtCreateSection 48192->48193 48193->48191 48194 4182dc 48193->48194 48195 4182eb NtUnmapViewOfSection 48194->48195 48196 4182fc NtMapViewOfSection 48194->48196 48195->48196 48197 418320 VirtualFree NtClose TerminateProcess 48196->48197 48198 418368 GetCurrentProcess NtMapViewOfSection 48196->48198 48197->48185 48199 418363 48197->48199 48198->48191 48203 418395 ctype 48198->48203 48199->48186 48200 418431 WriteProcessMemory 48200->48191 48204 418450 48200->48204 48201 418454 Wow64SetThreadContext 48201->48191 48202 41846d ResumeThread 48201->48202 48202->48186 48202->48191 48203->48200 48203->48201 48204->48201 48206 4024f9 48205->48206 48207 40250a 28 API calls 48206->48207 48208 4020b1 48207->48208 48208->47293 48209->47814 48220 412829 61 API calls 48217->48220 48222 443248 _Atexit 48221->48222 48223 443260 48222->48223 48225 443396 _Atexit GetModuleHandleW 48222->48225 48243 445909 EnterCriticalSection 48223->48243 48226 443254 48225->48226 48226->48223 48255 4433da GetModuleHandleExW 48226->48255 48227 443306 48244 443346 48227->48244 48230 443268 48230->48227 48232 4432dd 48230->48232 48263 443ff0 20 API calls _Atexit 48230->48263 48233 4432f5 48232->48233 48264 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 48232->48264 48265 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 48233->48265 48234 443323 48247 443355 48234->48247 48235 44334f 48266 4577a9 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 48235->48266 48243->48230 48267 445951 LeaveCriticalSection 48244->48267 48246 44331f 48246->48234 48246->48235 48268 448d49 48247->48268 48250 443383 48253 4433da _Atexit 8 API calls 48250->48253 48251 443363 GetPEB 48251->48250 48252 443373 GetCurrentProcess TerminateProcess 48251->48252 48252->48250 48254 44338b ExitProcess 48253->48254 48256 443404 GetProcAddress 48255->48256 48257 443427 48255->48257 48258 443419 48256->48258 48259 443436 48257->48259 48260 44342d FreeLibrary 48257->48260 48258->48257 48261 43502b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 48259->48261 48260->48259 48262 443440 48261->48262 48262->48223 48263->48232 48264->48233 48265->48227 48267->48246 48269 448d64 48268->48269 48270 448d6e 48268->48270 48275 43502b 48269->48275 48282 44854a 5 API calls 2 library calls 48270->48282 48273 44335f 48273->48250 48273->48251 48274 448d85 48274->48269 48276 435036 IsProcessorFeaturePresent 48275->48276 48277 435034 48275->48277 48279 435078 48276->48279 48277->48273 48283 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48279->48283 48281 43515b 48281->48273 48282->48274 48283->48281 48284 40165e 48285 401666 48284->48285 48287 401669 48284->48287 48286 4016a8 48288 43455e new 22 API calls 48286->48288 48287->48286 48289 401696 48287->48289 48290 40169c 48288->48290 48291 43455e new 22 API calls 48289->48291 48291->48290

                                    Control-flow Graph

                                    APIs
                                    • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                    • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                    • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                    • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                    • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                    • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                    • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                    • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                                    • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                                    • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                                    • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                                    • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                                    • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad$HandleModule
                                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                    • API String ID: 4236061018-3687161714
                                    • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                    • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                    • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                    • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 102 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->102 80 40ec06-40ec1c call 401fab call 413584 70->80 81 40ec3e-40ec45 call 40d0a4 70->81 92 40ec21-40ec25 80->92 90 40ec47-40ec49 81->90 91 40ec4e-40ec55 81->91 94 40ef2c 90->94 95 40ec57 91->95 96 40ec59-40ec65 call 41b354 91->96 92->81 98 40ec27-40ec3d call 401fab call 4139e4 92->98 94->49 95->96 103 40ec67-40ec69 96->103 104 40ec6e-40ec72 96->104 98->81 123 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 102->123 103->104 107 40ecb1-40ecc4 call 401e65 call 401fab 104->107 108 40ec74 call 407751 104->108 128 40ecc6 call 407790 107->128 129 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->129 117 40ec79-40ec7b 108->117 120 40ec87-40ec9a call 401e65 call 401fab 117->120 121 40ec7d-40ec82 call 407773 call 40729b 117->121 120->107 141 40ec9c-40eca2 120->141 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 123->157 128->129 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 129->177 178 40edbb-40edbf 129->178 141->107 144 40eca4-40ecaa 141->144 144->107 147 40ecac call 40729b 144->147 147->107 177->178 205 40ed70-40ed9c call 401e65 call 401fab call 401e65 call 401fab call 40da6f 177->205 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 236 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->236 184 40ee4a-40ee54 call 409092 181->184 185 40edce-40ee40 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->185 192 40ee59-40ee7d call 40247c call 434829 184->192 271 40ee45-40ee48 185->271 212 40ee8c 192->212 213 40ee7f-40ee8a call 436f10 192->213 247 40eda1-40edb6 call 401f13 call 401f09 205->247 215 40ee8e-40ef03 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 call 434832 call 401e65 call 40b9f8 212->215 213->215 215->236 286 40ef09-40ef1e call 401e65 call 41bcef call 40f4af 215->286 287 40f017-40f019 236->287 288 40effc 236->288 247->178 271->192 304 40ef23-40ef28 286->304 290 40f01b-40f01d 287->290 291 40f01f 287->291 289 40effe-40f015 call 41ce2c CreateThread 288->289 294 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 289->294 290->289 291->294 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 294->344 345 40f13c 294->345 304->236 306 40ef2a 304->306 306->94 347 40f13e-40f156 call 401e65 call 401fab 344->347 345->347 357 40f194-40f1a7 call 401e65 call 401fab 347->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 347->358 368 40f207-40f21a call 401e65 call 401fab 357->368 369 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->369 358->357 379 40f255-40f279 call 41b69e call 401f13 call 401f09 368->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 368->380 369->368 400 40f27b 379->400 401 40f27e-40f291 CreateThread 379->401 380->379 400->401 404 40f293-40f29d CreateThread 401->404 405 40f29f-40f2a6 401->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f322 call 401fab call 41353a 413->416 415->418 416->157 428 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 416->428 418->416 443 40f381-40f386 DeleteFileW 428->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->123 445->123 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                    APIs
                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\m4VuyJtPKi.exe,00000104), ref: 0040EA29
                                      • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                    • String ID: SG$ SG$,aF$,aF$8SG$8SG$Access Level: $Administrator$C:\Users\user\Desktop\m4VuyJtPKi.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                    • API String ID: 2830904901-2497059444
                                    • Opcode ID: 05a2c1f7cd86b5b88623af6cc1f8f5c2a2542f143a41f83a6db17b3df0a6dda3
                                    • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                    • Opcode Fuzzy Hash: 05a2c1f7cd86b5b88623af6cc1f8f5c2a2542f143a41f83a6db17b3df0a6dda3
                                    • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 448 41812a-418153 449 418157-4181be GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 4181c4-4181cb 449->450 451 4184bb 449->451 450->451 453 4181d1-4181d8 450->453 452 4184bd-4184c7 451->452 453->451 454 4181de-4181e0 453->454 454->451 455 4181e6-418213 call 436f10 * 2 454->455 455->451 460 418219-418224 455->460 460->451 461 41822a-41825a CreateProcessW 460->461 462 418260-418288 VirtualAlloc Wow64GetThreadContext 461->462 463 4184b5 GetLastError 461->463 464 41847f-4184b3 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->464 465 41828e-4182ae ReadProcessMemory 462->465 463->451 464->451 465->464 466 4182b4-4182d6 NtCreateSection 465->466 466->464 467 4182dc-4182e9 466->467 468 4182eb-4182f6 NtUnmapViewOfSection 467->468 469 4182fc-41831e NtMapViewOfSection 467->469 468->469 470 418320-41835d VirtualFree NtClose TerminateProcess 469->470 471 418368-41838f GetCurrentProcess NtMapViewOfSection 469->471 470->449 472 418363 470->472 471->464 473 418395-418399 471->473 472->451 474 4183a2-4183c0 call 436990 473->474 475 41839b-41839f 473->475 478 418402-41840b 474->478 479 4183c2-4183d0 474->479 475->474 481 41842b-41842f 478->481 482 41840d-418413 478->482 480 4183d2-4183f5 call 436990 479->480 492 4183f7-4183fe 480->492 485 418431-41844e WriteProcessMemory 481->485 486 418454-41846b Wow64SetThreadContext 481->486 482->481 484 418415-418428 call 41853e 482->484 484->481 485->464 490 418450 485->490 486->464 487 41846d-418479 ResumeThread 486->487 487->464 491 41847b-41847d 487->491 490->486 491->452 492->478
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                    • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                    • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                    • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                    • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                    • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004182CE
                                    • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182F6
                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418316
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                    • NtClose.NTDLL(?), ref: 00418332
                                    • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                    • NtMapViewOfSection.NTDLL(?,00000000), ref: 00418387
                                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                    • ResumeThread.KERNEL32(?), ref: 00418470
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                    • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                    • NtUnmapViewOfSection.NTDLL(00000000), ref: 00418499
                                    • NtClose.NTDLL(?), ref: 004184A3
                                    • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                    • GetLastError.KERNEL32 ref: 004184B5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                    • API String ID: 3150337530-3035715614
                                    • Opcode ID: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                                    • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                    • Opcode Fuzzy Hash: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                                    • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 624 40f4af-40f4e2 GetModuleFileNameW call 407801 627 40f4e8-40f516 call 401f86 CreateToolhelp32Snapshot Process32FirstW 624->627 628 40f669-40f66d call 41b71b 624->628 634 40f586-40f597 Process32NextW 627->634 632 40f672-40f69d call 401f13 call 401f09 call 411190 628->632 652 40f6a3-40f6f3 CloseHandle call 4020df call 401f04 call 41c516 call 401fab call 401f04 call 4185a3 632->652 653 40f7c9-40f7e1 call 401f09 632->653 636 40f518-40f57b call 40417e call 402305 call 4022ca call 402305 call 409c16 call 40ba07 634->636 637 40f59d-40f5b8 CloseHandle call 407801 634->637 672 40f5c8-40f5d3 call 41c26e 636->672 673 40f57d-40f581 call 401f09 636->673 646 40f664 call 401f09 637->646 647 40f5be-40f5c3 call 401f09 637->647 646->628 647->652 684 40f7a2-40f7b5 call 401fab call 4138b2 652->684 685 40f6f9-40f746 call 40417e call 401fab call 409196 call 401f04 call 4185a3 call 401f09 652->685 679 40f5d8-40f5fd call 401f13 call 401f09 call 407801 672->679 673->634 698 40f616-40f626 call 407801 679->698 699 40f5ff-40f611 call 401f09 * 2 679->699 696 40f7ba-40f7bf 684->696 725 40f748-40f787 call 401fab call 409196 call 401f04 call 4185a3 call 401f09 685->725 726 40f799-40f79d call 401f09 685->726 700 40f7c0-40f7c4 call 401fd8 696->700 708 40f657-40f660 call 401f09 698->708 709 40f628-40f636 call 41c076 698->709 699->653 700->653 708->646 709->708 719 40f638-40f652 call 40b9a7 call 401f09 709->719 719->637 725->726 740 40f789-40f797 call 40d0a4 call 401f09 725->740 726->684 740->700
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                      • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                      • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                    • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                    • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$xdF$xdF
                                    • API String ID: 3756808967-2341171916
                                    • Opcode ID: 2322833ead91c969bb27ba880cb03a47b8aee0cf57199944c8088438e116890c
                                    • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                    • Opcode Fuzzy Hash: 2322833ead91c969bb27ba880cb03a47b8aee0cf57199944c8088438e116890c
                                    • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 926 443355-443361 call 448d49 929 443383-44338f call 4433da ExitProcess 926->929 930 443363-443371 GetPEB 926->930 930->929 931 443373-44337d GetCurrentProcess TerminateProcess 930->931 931->929
                                    APIs
                                    • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG,004461B7,00000003), ref: 00443376
                                    • TerminateProcess.KERNEL32(00000000), ref: 0044337D
                                    • ExitProcess.KERNEL32 ref: 0044338F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CurrentExitTerminate
                                    • String ID: PkGNG
                                    • API String ID: 1703294689-263838557
                                    • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                    • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                    • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                    • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88

                                    Control-flow Graph

                                    APIs
                                    • _wcslen.LIBCMT ref: 0040CE42
                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\m4VuyJtPKi.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                                    • _wcslen.LIBCMT ref: 0040CF21
                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\m4VuyJtPKi.exe,00000000,00000000), ref: 0040CFBF
                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                    • _wcslen.LIBCMT ref: 0040D001
                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                    • ExitProcess.KERNEL32 ref: 0040D09D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                    • String ID: 6$C:\Users\user\Desktop\m4VuyJtPKi.exe$del$open$xdF
                                    • API String ID: 1579085052-100712852
                                    • Opcode ID: 6495fde6b392f9eb858c2a3303a44b43b13ad5651f9396b40cf209a04b4d567a
                                    • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                    • Opcode Fuzzy Hash: 6495fde6b392f9eb858c2a3303a44b43b13ad5651f9396b40cf209a04b4d567a
                                    • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 593 41c0ac-41c0cf lstrlenW 594 41c0d1-41c0d3 593->594 595 41c10a-41c140 call 436990 FindFirstVolumeW 593->595 596 41c0d7-41c0e9 call 43706a 594->596 601 41c1c7-41c1dd call 43bb56 595->601 602 41c146-41c14e GetLastError 595->602 603 41c0f1-41c100 lstrlenW 596->603 604 41c0eb-41c0ef 596->604 610 41c153-41c158 601->610 611 41c1e3 601->611 606 41c1f9-41c203 602->606 603->595 609 41c102-41c106 603->609 604->603 607 41c108 604->607 607->595 609->596 610->611 613 41c15e-41c164 610->613 612 41c1e8-41c1f6 FindVolumeClose 611->612 612->606 613->611 614 41c166-41c16b 613->614 614->611 615 41c16d-41c172 614->615 615->611 616 41c174-41c196 QueryDosDeviceW 615->616 617 41c261-41c269 GetLastError 616->617 618 41c19c-41c1ad lstrcmpW 616->618 617->612 619 41c213-41c239 GetVolumePathNamesForVolumeNameW 618->619 620 41c1af-41c1c5 FindNextVolumeW 618->620 619->617 622 41c23b-41c25f lstrcatW lstrcpyW 619->622 620->601 621 41c204-41c20f GetLastError 620->621 621->612 623 41c211 621->623 622->612 623->611
                                    APIs
                                    • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                    • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                    • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                    • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                    • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                    • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                    • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                    • _wcslen.LIBCMT ref: 0041C1CC
                                    • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                    • GetLastError.KERNEL32 ref: 0041C204
                                    • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                    • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                    • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                    • GetLastError.KERNEL32 ref: 0041C261
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                    • String ID: ?
                                    • API String ID: 3941738427-1684325040
                                    • Opcode ID: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                                    • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                    • Opcode Fuzzy Hash: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                                    • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96

                                    Control-flow Graph

                                    APIs
                                    • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LongNamePath
                                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                    • API String ID: 82841172-425784914
                                    • Opcode ID: adf8e105e4ec8d15e8fa743966c2532e6a50f574ddf78f0f1893a7fbfe08b25e
                                    • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                    • Opcode Fuzzy Hash: adf8e105e4ec8d15e8fa743966c2532e6a50f574ddf78f0f1893a7fbfe08b25e
                                    • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00413656: RegOpenKeyExW.KERNEL32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                      • Part of subcall function 00413656: RegQueryValueExW.KERNEL32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                      • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                      • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                      • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                    • _wcslen.LIBCMT ref: 0041B7F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                    • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                    • API String ID: 3286818993-122982132
                                    • Opcode ID: 77da0c146dddc5f1d0bad8223126102bd537a5143e26b4785d23f71469cec67e
                                    • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                    • Opcode Fuzzy Hash: 77da0c146dddc5f1d0bad8223126102bd537a5143e26b4785d23f71469cec67e
                                    • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                      • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                      • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                      • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                      • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                    • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseCurrentOpenQueryValueWow64
                                    • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                    • API String ID: 782494840-2070987746
                                    • Opcode ID: 097ad4c18ec624fedb80d4884fd642f61090c82991f5822b1a7281923b4d9afc
                                    • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                    • Opcode Fuzzy Hash: 097ad4c18ec624fedb80d4884fd642f61090c82991f5822b1a7281923b4d9afc
                                    • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 895 41c26e-41c290 OpenProcess 896 41c292-41c2a3 OpenProcess 895->896 897 41c2ac-41c2c2 K32GetProcessImageFileNameW 895->897 896->897 898 41c2a5-41c2aa 896->898 899 41c2c4-41c2ca CloseHandle 897->899 900 41c2cc-41c2d8 CloseHandle call 41c0ac 897->900 901 41c2e4-41c2f3 call 40417e 898->901 899->898 903 41c2dd-41c2e3 900->903 903->901
                                    APIs
                                    • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                    • K32GetProcessImageFileNameW.KERNEL32(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseHandleOpen$FileImageName
                                    • String ID:
                                    • API String ID: 2951400881-0
                                    • Opcode ID: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                                    • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                    • Opcode Fuzzy Hash: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                                    • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 906 41384f-413862 RegCreateKeyW 907 4138a1 906->907 908 413864-41389f call 40247c call 401f04 RegSetValueExW RegCloseKey 906->908 910 4138a3-4138b1 call 401f09 907->910 908->910
                                    APIs
                                    • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041385A
                                    • RegSetValueExW.KERNEL32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,759237E0,?), ref: 00413888
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,759237E0,?,?,?,?,?,0040CFE5,?,00000000), ref: 00413893
                                    Strings
                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413858
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                    • API String ID: 1818849710-1051519024
                                    • Opcode ID: 7402a2b63bcdafcb128c4f053b5539bf219f88ac2658cd62b5e42ce82679dadc
                                    • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                    • Opcode Fuzzy Hash: 7402a2b63bcdafcb128c4f053b5539bf219f88ac2658cd62b5e42ce82679dadc
                                    • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 916 4137aa-4137c1 RegCreateKeyA 917 4137c3-4137f8 call 40247c call 401fab RegSetValueExA RegCloseKey 916->917 918 4137fa 916->918 919 4137fc-41380a call 401fd8 917->919 918->919
                                    APIs
                                    • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                    • RegSetValueExA.KERNEL32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                    • RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID: Control Panel\Desktop
                                    • API String ID: 1818849710-27424756
                                    • Opcode ID: a1b035586d8a94c78f1a8b9bfdab4f73b16582c77fe3bde9cdb94950c835db19
                                    • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                    • Opcode Fuzzy Hash: a1b035586d8a94c78f1a8b9bfdab4f73b16582c77fe3bde9cdb94950c835db19
                                    • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 934 41c516-41c53a CreateFileW 935 41c540-41c571 GetFileSize call 40244e call 401fab ReadFile 934->935 936 41c53c-41c53e 934->936 942 41c573 935->942 943 41c575-41c57c CloseHandle 935->943 937 41c57e-41c582 936->937 942->943 943->937
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                    • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C543
                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C568
                                    • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E84), ref: 0041C576
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleReadSize
                                    • String ID:
                                    • API String ID: 3919263394-0
                                    • Opcode ID: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                                    • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                    • Opcode Fuzzy Hash: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                                    • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 944 40d0a4-40d0d0 call 401fab CreateMutexA GetLastError
                                    APIs
                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                    • GetLastError.KERNEL32 ref: 0040D0BE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateErrorLastMutex
                                    • String ID: SG
                                    • API String ID: 1925916568-3189917014
                                    • Opcode ID: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                    • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                    • Opcode Fuzzy Hash: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                    • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                                    APIs
                                    • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                    • RegCloseKey.KERNEL32(?), ref: 0041362D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID:
                                    • API String ID: 3677997916-0
                                    • Opcode ID: e5c88bf4778b1a12960ae4c3b265923e79f6a7b3b3cce25859afcc872f091df0
                                    • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                    • Opcode Fuzzy Hash: e5c88bf4778b1a12960ae4c3b265923e79f6a7b3b3cce25859afcc872f091df0
                                    • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044F461
                                    • _free.LIBCMT ref: 0044F49A
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F4A1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnvironmentStrings$Free_free
                                    • String ID:
                                    • API String ID: 2716640707-0
                                    • Opcode ID: b991ad062046a7f8009a1cec3e1e7660b44dc077275df6026a83b693fa0e4bd0
                                    • Instruction ID: 0fde98e0ac238faa149cd6f420f555edc5ad685e5938876998fddc3cfa248eb7
                                    • Opcode Fuzzy Hash: b991ad062046a7f8009a1cec3e1e7660b44dc077275df6026a83b693fa0e4bd0
                                    • Instruction Fuzzy Hash: 41E0E537545A226BB211323A6C49D6F2A58CFD27B6726003BF40486242EE288D0641BA
                                    APIs
                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 004135A4
                                    • RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004135C2
                                    • RegCloseKey.ADVAPI32(00000000), ref: 004135CD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID:
                                    • API String ID: 3677997916-0
                                    • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                    • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                    • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                    • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                    APIs
                                    • RegOpenKeyExW.KERNEL32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                    • RegQueryValueExW.KERNEL32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                    • RegCloseKey.ADVAPI32(?), ref: 004136A0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID:
                                    • API String ID: 3677997916-0
                                    • Opcode ID: 65d225e62495b603b94ecda2ada9fe67bc436a3b870d946b60a27cc720c1bdd3
                                    • Instruction ID: b2ddc0a972744091932d43abea1e646d3cdf78111d27e2b843060007377f7c4f
                                    • Opcode Fuzzy Hash: 65d225e62495b603b94ecda2ada9fe67bc436a3b870d946b60a27cc720c1bdd3
                                    • Instruction Fuzzy Hash: B7F04F75600218FBDF209B90DC05FDD7B7CEB04B15F1040A2BA45B5291DB749F949BA8
                                    APIs
                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                    • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                    • RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID:
                                    • API String ID: 1818849710-0
                                    • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                    • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                                    • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                    • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                    • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                    • Opcode Fuzzy Hash: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                    • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                    • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                    • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                    • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                    APIs
                                    • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                    • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                    • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                      • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                                      • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                                      • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                                      • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                                      • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                    • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                                    • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                    • DeleteFileA.KERNEL32(?), ref: 0040868D
                                      • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                      • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                      • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                      • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                    • Sleep.KERNEL32(000007D0), ref: 00408733
                                    • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                      • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                    • String ID: (PG$(aF$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                    • API String ID: 1067849700-414524693
                                    • Opcode ID: fcdbf4fb6dd101d42f9977cf6d492e888bbba3eaf2df88b777301792a4f9f952
                                    • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                    • Opcode Fuzzy Hash: fcdbf4fb6dd101d42f9977cf6d492e888bbba3eaf2df88b777301792a4f9f952
                                    • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 004056E6
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    • __Init_thread_footer.LIBCMT ref: 00405723
                                    • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                    • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                    • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                      • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                                    • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                    • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                    • CloseHandle.KERNEL32 ref: 00405A23
                                    • CloseHandle.KERNEL32 ref: 00405A2B
                                    • CloseHandle.KERNEL32 ref: 00405A3D
                                    • CloseHandle.KERNEL32 ref: 00405A45
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                    • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                    • API String ID: 2994406822-18413064
                                    • Opcode ID: 27313529cfa78f58172aee976d01e8b9f22e1d92cfe5b94072322bbe5aa05730
                                    • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                    • Opcode Fuzzy Hash: 27313529cfa78f58172aee976d01e8b9f22e1d92cfe5b94072322bbe5aa05730
                                    • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 00412141
                                      • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                      • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                      • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                                    • CloseHandle.KERNEL32(00000000), ref: 00412190
                                    • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                    • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                    • API String ID: 3018269243-13974260
                                    • Opcode ID: f9b84410780c88cb69858533740bb29ed00e9f5740ea2121e3a379a8b0ff9438
                                    • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                    • Opcode Fuzzy Hash: f9b84410780c88cb69858533740bb29ed00e9f5740ea2121e3a379a8b0ff9438
                                    • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                    APIs
                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                    • FindClose.KERNEL32(00000000), ref: 0040BC04
                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                    • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$CloseFile$FirstNext
                                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                    • API String ID: 1164774033-3681987949
                                    • Opcode ID: 84272cd078f5dd96425807e02dfef06d30edfacf1bd987a36cf4d4ac3b33a48d
                                    • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                    • Opcode Fuzzy Hash: 84272cd078f5dd96425807e02dfef06d30edfacf1bd987a36cf4d4ac3b33a48d
                                    • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                    APIs
                                    • OpenClipboard.USER32 ref: 004168FD
                                    • EmptyClipboard.USER32 ref: 0041690B
                                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                    • GlobalLock.KERNEL32(00000000), ref: 00416934
                                    • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                    • CloseClipboard.USER32 ref: 00416990
                                    • OpenClipboard.USER32 ref: 00416997
                                    • GetClipboardData.USER32(0000000D), ref: 004169A7
                                    • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                    • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                    • CloseClipboard.USER32 ref: 004169BF
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                    • String ID: !D@$xdF
                                    • API String ID: 3520204547-3540039394
                                    • Opcode ID: f76d19ba9205f9d175998ddab78cc985ebb73623b778e01421a556dab9364850
                                    • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                    • Opcode Fuzzy Hash: f76d19ba9205f9d175998ddab78cc985ebb73623b778e01421a556dab9364850
                                    • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                    APIs
                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                    • FindClose.KERNEL32(00000000), ref: 0040BE04
                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                    • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                    • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$Close$File$FirstNext
                                    • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                    • API String ID: 3527384056-432212279
                                    • Opcode ID: 11f57d61b12c0efa0043e7d00ad3c85788b2faa7f690f7da1a38fb2ea654c925
                                    • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                    • Opcode Fuzzy Hash: 11f57d61b12c0efa0043e7d00ad3c85788b2faa7f690f7da1a38fb2ea654c925
                                    • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 0041A04A
                                    • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                    • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                    • GetLocalTime.KERNEL32(?), ref: 0041A196
                                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                    • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                    • API String ID: 489098229-1431523004
                                    • Opcode ID: 965bdd5cead83715db6b8d3f537c7cfccf5eddc26aa64969169a3fa2730a8ce0
                                    • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                    • Opcode Fuzzy Hash: 965bdd5cead83715db6b8d3f537c7cfccf5eddc26aa64969169a3fa2730a8ce0
                                    • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                    APIs
                                    • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                    • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                    • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                    • CloseHandle.KERNEL32(?), ref: 004134A0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                    • String ID:
                                    • API String ID: 297527592-0
                                    • Opcode ID: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                                    • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                    • Opcode Fuzzy Hash: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                                    • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 0$1$2$3$4$5$6$7$VG
                                    • API String ID: 0-1861860590
                                    • Opcode ID: fa5d28c5653a06ee74d606b0804547a39682ca64517b0fde9ecd30e9690a319d
                                    • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                    • Opcode Fuzzy Hash: fa5d28c5653a06ee74d606b0804547a39682ca64517b0fde9ecd30e9690a319d
                                    • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                    APIs
                                      • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                      • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                      • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                      • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                      • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                    • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                                    • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                    • String ID: !D@$$aF$(aF$,aF$PowrProf.dll$SetSuspendState
                                    • API String ID: 1589313981-3345310279
                                    • Opcode ID: 0c2a3801cae00969e12b127efc78c0bcf29ed3b0a45619b825154084a83bf59e
                                    • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                    • Opcode Fuzzy Hash: 0c2a3801cae00969e12b127efc78c0bcf29ed3b0a45619b825154084a83bf59e
                                    • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                    APIs
                                    • _wcslen.LIBCMT ref: 0040755C
                                    • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Object_wcslen
                                    • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                    • API String ID: 240030777-3166923314
                                    • Opcode ID: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                                    • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                    • Opcode Fuzzy Hash: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                                    • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                    APIs
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                    • GetLastError.KERNEL32 ref: 0041A84C
                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                    • String ID:
                                    • API String ID: 3587775597-0
                                    • Opcode ID: d30abde1dbb190bd1073015d89e36a29876ffbcb1aea83829fa7b4723d33a441
                                    • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                    • Opcode Fuzzy Hash: d30abde1dbb190bd1073015d89e36a29876ffbcb1aea83829fa7b4723d33a441
                                    • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                    APIs
                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                      • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Find$CreateFirstNext
                                    • String ID: 8SG$8eF$PXG$PXG$NG$PG
                                    • API String ID: 341183262-432830541
                                    • Opcode ID: 5000a1ae517004edb588aecbc8a4db28259567cc90a4b3620c8caad66856040e
                                    • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                    • Opcode Fuzzy Hash: 5000a1ae517004edb588aecbc8a4db28259567cc90a4b3620c8caad66856040e
                                    • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                    • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                    • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                    • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                    • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                    • String ID: JD$JD$JD
                                    • API String ID: 745075371-3517165026
                                    • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                    • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                    • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                    • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                    APIs
                                    • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                    • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                    • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$CloseFile$FirstNext
                                    • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                    • API String ID: 1164774033-405221262
                                    • Opcode ID: 8f43a50caeb7f96ea2a04bf344663b78dd46fabd6f36d276683e27008a5af24a
                                    • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                    • Opcode Fuzzy Hash: 8f43a50caeb7f96ea2a04bf344663b78dd46fabd6f36d276683e27008a5af24a
                                    • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C41F
                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C42C
                                      • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                                    • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C44D
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C473
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                    • String ID:
                                    • API String ID: 2341273852-0
                                    • Opcode ID: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                                    • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                    • Opcode Fuzzy Hash: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                                    • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                    APIs
                                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                    • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                    • GetLastError.KERNEL32 ref: 0040A328
                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                                    • TranslateMessage.USER32(?), ref: 0040A385
                                    • DispatchMessageA.USER32(?), ref: 0040A390
                                    Strings
                                    • Keylogger initialization failure: error , xrefs: 0040A33C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                    • String ID: Keylogger initialization failure: error
                                    • API String ID: 3219506041-952744263
                                    • Opcode ID: ee9b61757b1d841530661ae87ecce44939ab300f3fbebbd6f189632f482ecdb9
                                    • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                    • Opcode Fuzzy Hash: ee9b61757b1d841530661ae87ecce44939ab300f3fbebbd6f189632f482ecdb9
                                    • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA
                                    APIs
                                    • GetForegroundWindow.USER32 ref: 0040A451
                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                    • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                    • GetKeyState.USER32(00000010), ref: 0040A46E
                                    • GetKeyboardState.USER32(?), ref: 0040A479
                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                    • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A535
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                    • String ID:
                                    • API String ID: 1888522110-0
                                    • Opcode ID: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                                    • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                    • Opcode Fuzzy Hash: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                                    • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __floor_pentium4
                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$PkGNG
                                    • API String ID: 4168288129-3873169313
                                    • Opcode ID: ed5127cdc400e90a0cd04182132ef1189bad1dc249964083a3aeb657203f5d4f
                                    • Instruction ID: 22fd31c6184e07a9d3e8c26eafc68e38345e899adb4ac4f90a3aea4af7cb717d
                                    • Opcode Fuzzy Hash: ed5127cdc400e90a0cd04182132ef1189bad1dc249964083a3aeb657203f5d4f
                                    • Instruction Fuzzy Hash: BBC27E71D046288FDB25CE28DD407EAB3B5EB8530AF1541EBD80DE7241E778AE898F45
                                    APIs
                                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                                    • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressCloseCreateLibraryLoadProcsend
                                    • String ID: SHDeleteKeyW$Shlwapi.dll
                                    • API String ID: 2127411465-314212984
                                    • Opcode ID: f945da85bb6bebb72834e1637a6fb62ef5415d014cc959b1a16cbfa1d09daad7
                                    • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                    • Opcode Fuzzy Hash: f945da85bb6bebb72834e1637a6fb62ef5415d014cc959b1a16cbfa1d09daad7
                                    • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                    APIs
                                    • _free.LIBCMT ref: 00449292
                                    • _free.LIBCMT ref: 004492B6
                                    • _free.LIBCMT ref: 0044943D
                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                    • _free.LIBCMT ref: 00449609
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                    • String ID:
                                    • API String ID: 314583886-0
                                    • Opcode ID: 8093d2f3b8c045a868d7bcc6f26560e4bd8a72bf10d174932f02c5f03ba06de8
                                    • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                    • Opcode Fuzzy Hash: 8093d2f3b8c045a868d7bcc6f26560e4bd8a72bf10d174932f02c5f03ba06de8
                                    • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                    APIs
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DownloadExecuteFileShell
                                    • String ID: 0aF$0aF$C:\Users\user\Desktop\m4VuyJtPKi.exe$open
                                    • API String ID: 2825088817-810889176
                                    • Opcode ID: 8d14234489d2dc2ef74fbffaebafc3077de5391ae8676338d369892ecc6f296d
                                    • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                    • Opcode Fuzzy Hash: 8d14234489d2dc2ef74fbffaebafc3077de5391ae8676338d369892ecc6f296d
                                    • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 0040884C
                                    • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                    • String ID: xdF
                                    • API String ID: 1771804793-999140092
                                    • Opcode ID: 9f3222fd4972e7f08ae4cd94b003485bbb971300a115a932fd628a62a647425b
                                    • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                    • Opcode Fuzzy Hash: 9f3222fd4972e7f08ae4cd94b003485bbb971300a115a932fd628a62a647425b
                                    • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                    APIs
                                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                    • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                    • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                    Strings
                                    • http://geoplugin.net/json.gp, xrefs: 0041B448
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileRead
                                    • String ID: http://geoplugin.net/json.gp
                                    • API String ID: 3121278467-91888290
                                    • Opcode ID: a25011c3194e4ddefe0197320a1bea68bc8c32844ecc82b49fb84bedb4f9d405
                                    • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                    • Opcode Fuzzy Hash: a25011c3194e4ddefe0197320a1bea68bc8c32844ecc82b49fb84bedb4f9d405
                                    • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                    APIs
                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                    • GetLastError.KERNEL32 ref: 0040BA93
                                    Strings
                                    • UserProfile, xrefs: 0040BA59
                                    • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                    • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteErrorFileLast
                                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                    • API String ID: 2018770650-1062637481
                                    • Opcode ID: 8d1b9c386d9f6ca777f4705084fddfe26be0f649cbc95c9792bf321ed182c299
                                    • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                    • Opcode Fuzzy Hash: 8d1b9c386d9f6ca777f4705084fddfe26be0f649cbc95c9792bf321ed182c299
                                    • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                    APIs
                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                    • GetLastError.KERNEL32 ref: 004179D8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                    • String ID: SeShutdownPrivilege
                                    • API String ID: 3534403312-3733053543
                                    • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                    • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                    • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                    • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 00409293
                                      • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                    • FindClose.KERNEL32(00000000), ref: 004093FC
                                      • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,00000000,00000000,?,00474EF8,?), ref: 00404E38
                                      • Part of subcall function 00404E26: SetEvent.KERNEL32(00000000), ref: 00404E43
                                      • Part of subcall function 00404E26: CloseHandle.KERNEL32(00000000), ref: 00404E4C
                                    • FindClose.KERNEL32(00000000), ref: 004095F4
                                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                    • String ID:
                                    • API String ID: 1824512719-0
                                    • Opcode ID: ff3fa93bb162536d5c9b5af999d8eb32324236848a0741c788d8c8c5ee2ae2a2
                                    • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                    • Opcode Fuzzy Hash: ff3fa93bb162536d5c9b5af999d8eb32324236848a0741c788d8c8c5ee2ae2a2
                                    • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: FSE$FSE$PkGNG
                                    • API String ID: 0-1266307253
                                    • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                    • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                                    • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                    • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ManagerStart
                                    • String ID:
                                    • API String ID: 276877138-0
                                    • Opcode ID: 3fc825cdaf5b3c830df2a570b4d58928aafbb4be2e2bcb8024994744d056a879
                                    • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                    • Opcode Fuzzy Hash: 3fc825cdaf5b3c830df2a570b4d58928aafbb4be2e2bcb8024994744d056a879
                                    • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                    APIs
                                      • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 004135A4
                                      • Part of subcall function 00413584: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004135C2
                                      • Part of subcall function 00413584: RegCloseKey.ADVAPI32(00000000), ref: 004135CD
                                    • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                    • ExitProcess.KERNEL32 ref: 0040F905
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseExitOpenProcessQuerySleepValue
                                    • String ID: 5.1.3 Pro$override$pth_unenc
                                    • API String ID: 2281282204-1392497409
                                    • Opcode ID: c5b06e37a3713f879a9217b171144b2e35177e4ae347fb85315710d5445c2025
                                    • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                    • Opcode Fuzzy Hash: c5b06e37a3713f879a9217b171144b2e35177e4ae347fb85315710d5445c2025
                                    • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                                    APIs
                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                    • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID: ACP$OCP
                                    • API String ID: 2299586839-711371036
                                    • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                    • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                    • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                    • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                    APIs
                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFind$FirstNextsend
                                    • String ID: 8eF$XPG$XPG
                                    • API String ID: 4113138495-4157548504
                                    • Opcode ID: 41684cb1e88a3f667192eedea710f542025b1d24c6d635ee1a598caf91c6a2f1
                                    • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                    • Opcode Fuzzy Hash: 41684cb1e88a3f667192eedea710f542025b1d24c6d635ee1a598caf91c6a2f1
                                    • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                    APIs
                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                      • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                      • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                      • Part of subcall function 004137AA: RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateInfoParametersSystemValue
                                    • String ID: ,aF$Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                    • API String ID: 4127273184-3126330168
                                    • Opcode ID: 1b8314d2076e9d5c703d8fca3d96c61d813be21baf7682ae790ff92cd480d8bc
                                    • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                    • Opcode Fuzzy Hash: 1b8314d2076e9d5c703d8fca3d96c61d813be21baf7682ae790ff92cd480d8bc
                                    • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                    APIs
                                    • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                                    • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                    • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                    • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Resource$FindLoadLockSizeof
                                    • String ID: SETTINGS
                                    • API String ID: 3473537107-594951305
                                    • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                    • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                    • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                    • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 004096A5
                                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$File$CloseFirstH_prologNext
                                    • String ID:
                                    • API String ID: 1157919129-0
                                    • Opcode ID: d95c5d10ec8c802ca17e1fdb0925f1667ecef1613424a6e27ce08fc68be056f6
                                    • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                    • Opcode Fuzzy Hash: d95c5d10ec8c802ca17e1fdb0925f1667ecef1613424a6e27ce08fc68be056f6
                                    • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                    • _wcschr.LIBVCRUNTIME ref: 00451ECA
                                    • _wcschr.LIBVCRUNTIME ref: 00451ED8
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                    • String ID:
                                    • API String ID: 4212172061-0
                                    • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                    • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                    • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                    • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                    • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                    • String ID: p'E$JD
                                    • API String ID: 1084509184-908320845
                                    • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                    • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                    • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                    • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorInfoLastLocale$_free$_abort
                                    • String ID:
                                    • API String ID: 2829624132-0
                                    • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                    • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                    • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                    • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                    • String ID:
                                    • API String ID: 3906539128-0
                                    • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                    • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                    • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                    • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                    APIs
                                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,00433550,00000034,?,?,00000000), ref: 004338DA
                                    • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?), ref: 004338F0
                                    • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?,0041E2E2), ref: 00433902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$Context$AcquireRandomRelease
                                    • String ID:
                                    • API String ID: 1815803762-0
                                    • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                    • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                    • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                    • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                    APIs
                                    • OpenClipboard.USER32(00000000), ref: 0040B74C
                                    • GetClipboardData.USER32(0000000D), ref: 0040B758
                                    • CloseClipboard.USER32 ref: 0040B760
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Clipboard$CloseDataOpen
                                    • String ID:
                                    • API String ID: 2058664381-0
                                    • Opcode ID: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                                    • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                    • Opcode Fuzzy Hash: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                                    • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                    APIs
                                    • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                                    • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                                    • CloseHandle.KERNEL32(00000000,?,?,0041605F,00000000), ref: 0041BBE7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseHandleOpenResume
                                    • String ID:
                                    • API String ID: 3614150671-0
                                    • Opcode ID: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                    • Instruction ID: 00af7d86c2812e48088786baf9e1e683bef33431c8858657b58e82835f0f92e7
                                    • Opcode Fuzzy Hash: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                    • Instruction Fuzzy Hash: 7AD05E36204121E3C220176A7C0CD97AD68DBC5AA2705412AF804C22609A60CC0186E4
                                    APIs
                                    • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                                    • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                                    • CloseHandle.KERNEL32(00000000,?,?,0041603A,00000000), ref: 0041BBBB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseHandleOpenSuspend
                                    • String ID:
                                    • API String ID: 1999457699-0
                                    • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                    • Instruction ID: 611eda4fe747f1c58df557fb912083c2b4b70512fbfbfb6239720577e9304ccf
                                    • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                    • Instruction Fuzzy Hash: 98D05E36204121E3C7211B6A7C0CD97AD68DFC5AA2705412AF804D26549A20CC0186E4
                                    APIs
                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,000000FF,?,00000008,PkGNG,PkGNG,004533A6,000000FF,?,00000008,?,?,0045625D,00000000), ref: 004535D8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionRaise
                                    • String ID: PkGNG
                                    • API String ID: 3997070919-263838557
                                    • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                    • Instruction ID: 7263c04077df6a1dd25da4ac29b5b982fa38ace811980f45f75c7c5cedc24273
                                    • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                    • Instruction Fuzzy Hash: 0FB13B315106089FD715CF28C48AB657BE0FF053A6F25865DE899CF3A2C339EA96CB44
                                    APIs
                                    • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FeaturePresentProcessor
                                    • String ID:
                                    • API String ID: 2325560087-3916222277
                                    • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                    • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                    • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                    • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: .
                                    • API String ID: 0-248832578
                                    • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                    • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                                    • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                    • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                    • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                    • String ID: JD
                                    • API String ID: 1084509184-2669065882
                                    • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                    • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                    • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                    • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                    APIs
                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID: GetLocaleInfoEx
                                    • API String ID: 2299586839-2904428671
                                    • Opcode ID: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                    • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                    • Opcode Fuzzy Hash: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                    • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                    APIs
                                    • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B6BB
                                    • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Name$ComputerUser
                                    • String ID:
                                    • API String ID: 4229901323-0
                                    • Opcode ID: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                                    • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                    • Opcode Fuzzy Hash: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                                    • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: PkGNG$wA
                                    • API String ID: 0-1404076192
                                    • Opcode ID: a138c4e0aeabb2bccdb66877e2b9435159f75a40726a9d3314504188017a6109
                                    • Instruction ID: 096ff1c695f9ab27d4b2dbab46670c8098de74970727e2ec16deab2a6828ec1d
                                    • Opcode Fuzzy Hash: a138c4e0aeabb2bccdb66877e2b9435159f75a40726a9d3314504188017a6109
                                    • Instruction Fuzzy Hash: EAB1A37951429A8ACB05EF68C4913F63BA1EF6A301F0850B9EC9CCF757D2398506EB24
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 0$PkGNG
                                    • API String ID: 0-1056914901
                                    • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                    • Instruction ID: 84bf5d8b6cf777f915eff3509e2c27b9c7ae744ab127a35c194aadb47efed811
                                    • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                    • Instruction Fuzzy Hash: E1517761E0660557DF38892A94D67BF23A59B4E308F18351FE483CB3C2C65EEE06835E
                                    APIs
                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                                    • HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$FreeProcess
                                    • String ID:
                                    • API String ID: 3859560861-0
                                    • Opcode ID: 95356b50ae1c40d028bb7c10486cf6eec28d3cbd66e590edfc92b155960a397c
                                    • Instruction ID: dd486cb6b879bf1be37f4e59d5b3b18419fca2aff5c7e471244091183f2ba527
                                    • Opcode Fuzzy Hash: 95356b50ae1c40d028bb7c10486cf6eec28d3cbd66e590edfc92b155960a397c
                                    • Instruction Fuzzy Hash: 0D113632000B11AFC7309F54DE85957BBEAFF08715305892EF29682922CB75FCA0CB48
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 0
                                    • API String ID: 0-4108050209
                                    • Opcode ID: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                    • Instruction ID: b5ae8e6f7fa87a7dee9e60626e0a37a25df5f2dd99b83f8da903d7583ecded6c
                                    • Opcode Fuzzy Hash: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                    • Instruction Fuzzy Hash: 0C129E727083048BD304DF65D882A1EB7E2BFCC758F15892EF495AB381DA74E915CB86
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: PkGNG
                                    • API String ID: 0-263838557
                                    • Opcode ID: cd36fe8c387ca2855096d15b7bf2cfed8e34aa58cb0db234df7a19e6c716ea84
                                    • Instruction ID: b033fe34555866f616fd3cc64b543b740d9cc82fbf2d17309ab2a27531c6336b
                                    • Opcode Fuzzy Hash: cd36fe8c387ca2855096d15b7bf2cfed8e34aa58cb0db234df7a19e6c716ea84
                                    • Instruction Fuzzy Hash: 6C02CEB17046528BC358CF2EEC5053AB7E1AB8D311744863EE495C7781EB35FA22CB94
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: PkGNG
                                    • API String ID: 0-263838557
                                    • Opcode ID: 88b47d59bd8f9e39717b2a9a8c0dcea2e64fabbb26349240269cb2a589f8870d
                                    • Instruction ID: 06b531cc06dcd57701b547059d2c567c45bbe225ee7d26ac7aed84b394be02a5
                                    • Opcode Fuzzy Hash: 88b47d59bd8f9e39717b2a9a8c0dcea2e64fabbb26349240269cb2a589f8870d
                                    • Instruction Fuzzy Hash: 2DF19D716142558FC348CF1DE8A187BB3E1FB89311B450A2EF582C3391DB79EA16CB56
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free$InfoLocale_abort
                                    • String ID:
                                    • API String ID: 1663032902-0
                                    • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                    • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                    • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                    • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$InfoLocale_abort_free
                                    • String ID:
                                    • API String ID: 2692324296-0
                                    • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                    • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                    • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                    • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                    APIs
                                      • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(?,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                    • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                    • String ID:
                                    • API String ID: 1272433827-0
                                    • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                    • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                    • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                    • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                    • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                    • String ID:
                                    • API String ID: 1084509184-0
                                    • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                    • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                    • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                    • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                    APIs
                                    • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.3 Pro), ref: 0040F920
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID:
                                    • API String ID: 2299586839-0
                                    • Opcode ID: 2888965568e38a2ba7a5abe7093904758464576a93ba76aee1c710f175ee0f35
                                    • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                    • Opcode Fuzzy Hash: 2888965568e38a2ba7a5abe7093904758464576a93ba76aee1c710f175ee0f35
                                    • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                    • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                    • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                    • Instruction Fuzzy Hash:
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: @
                                    • API String ID: 0-2766056989
                                    • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                    • Instruction ID: bbd91956ea41f9089fdf4ea26de33e0e8d132f349ea16d9e77f48d305cf446da
                                    • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                    • Instruction Fuzzy Hash: F1412975A183558FC340CF29D58020AFBE1FFC8318F645A1EF889A3350D379E9428B86
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                    • Instruction ID: 4200599dcb49c21c1ca78238ad82984ca11e49a574bdd01b256a4bdf4e559873
                                    • Opcode Fuzzy Hash: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                    • Instruction Fuzzy Hash: D2322521D69F414DE7239A35CC22336A24CBFB73C5F15D737E81AB5AAAEB29C4834105
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 51b096497e0208ccec2a2f4b5eaf582f7b18d03e206244163c5319e84589e6e5
                                    • Instruction ID: 06c66d0f35fb266b7f69fbfce4f1f639eb17408d85dd7e5468211ecdc8378744
                                    • Opcode Fuzzy Hash: 51b096497e0208ccec2a2f4b5eaf582f7b18d03e206244163c5319e84589e6e5
                                    • Instruction Fuzzy Hash: 7932C2716087459BC715DF28C4807ABB7E5BF84318F040A3EF89587392D779D98ACB8A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                    • Instruction ID: 2ce137016e68017aebaac4bbf916a57dff7c64f07ba89619fc9d118b501662d8
                                    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                    • Instruction Fuzzy Hash: F9C1D5B22091930AEF3D4639853063FFAA05E957B171A635FE4F2CB2D4FE18C924D514
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                    • Instruction ID: bc2d6065b6eca92eb436045fb502f22698d18e4b36ed1375ff5d5b4a3f5914d0
                                    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                    • Instruction Fuzzy Hash: 75C1D7722091930AEF2D4739853463FFAA15EA57B171A236FE4F2CB2D4FE28C924D514
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                    • Instruction ID: 708e8454946620f186a1700387687a053fc407bd339bf74556c1f47a113f5a1a
                                    • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                    • Instruction Fuzzy Hash: 95C1C3B220D0930AEF3D4639853063FFAA15EA67B171A675ED4F2CB2D4FE18C924D614
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                    • Instruction ID: 79ee4f31eba35b7567f7a499d226924a3a6c1d38d98321864059dc3c63d33f3d
                                    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                    • Instruction Fuzzy Hash: 76C1E6B220D0930AEF3D4639853463FBAA15EA57B171A236FD4F2CB2D4FE18C924C614
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                    • Instruction ID: 32d6082e35155a0a096806a6943d6f48c3d67459c64856e3d931f7c23e0710f9
                                    • Opcode Fuzzy Hash: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                    • Instruction Fuzzy Hash: 59618971202709A6EE34892B88967BF63949F6D314F10342FE983DB3C1D65DDD82931E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                    • Instruction ID: 5d22fc1bcc5d638cf6a4a0606be4d5c4d5bba199c703cf788a7f99cafe8d65e8
                                    • Opcode Fuzzy Hash: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                    • Instruction Fuzzy Hash: 12615871602718A6DA38592B88977BF2384EB2D344F94351BE483DB3C1D75EAD43871E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                    • Instruction ID: 6c705508b021f12d90b9f9697341ee8142861c1d23b7247138392dbd6e0aa073
                                    • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                    • Instruction Fuzzy Hash: 59517671603604A7EF3445AB85567BF63899B0E304F18395FE882C73C2C52DDE02875E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f668ae4ce8ddce9dd25c23f8729a4a0b6b4a9a792d26258ec3aea80ac56d2768
                                    • Instruction ID: d4d389248adab082d17fbdeb677dfbf93ddf16fcbb8c162b69e64d6cf0e33668
                                    • Opcode Fuzzy Hash: f668ae4ce8ddce9dd25c23f8729a4a0b6b4a9a792d26258ec3aea80ac56d2768
                                    • Instruction Fuzzy Hash: 61615B72A083059BC308DF35E481A5FB7E4AFCC718F814E2EF595D6151EA74EA08CB86
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                    • Instruction ID: 582e3a7babb983407823034c482dc4f24404013c153b7f4d28c3fef3b0c68a44
                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                    • Instruction Fuzzy Hash: 43113B7720034183D60CAA6DC4B45BBD795EADE320FBD627FF0414B744CA2AD4459508
                                    APIs
                                    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                      • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                    • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                    • DeleteDC.GDI32(00000000), ref: 00418F65
                                    • DeleteDC.GDI32(00000000), ref: 00418F68
                                    • DeleteObject.GDI32(00000000), ref: 00418F6B
                                    • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                    • DeleteDC.GDI32(00000000), ref: 00418F9D
                                    • DeleteDC.GDI32(00000000), ref: 00418FA0
                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                    • GetCursorInfo.USER32(?), ref: 00418FE2
                                    • GetIconInfo.USER32(?,?), ref: 00418FF8
                                    • DeleteObject.GDI32(?), ref: 00419027
                                    • DeleteObject.GDI32(?), ref: 00419034
                                    • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                    • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                    • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                    • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                    • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                    • DeleteDC.GDI32(?), ref: 004191B7
                                    • DeleteDC.GDI32(00000000), ref: 004191BA
                                    • DeleteObject.GDI32(00000000), ref: 004191BD
                                    • GlobalFree.KERNEL32(?), ref: 004191C8
                                    • DeleteObject.GDI32(00000000), ref: 0041927C
                                    • GlobalFree.KERNEL32(?), ref: 00419283
                                    • DeleteDC.GDI32(?), ref: 00419293
                                    • DeleteDC.GDI32(00000000), ref: 0041929E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                    • String ID: DISPLAY
                                    • API String ID: 4256916514-865373369
                                    • Opcode ID: 8b6b0303c96bfbec82164a612603de16d299020e144a6f61fdedad8e58236794
                                    • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                    • Opcode Fuzzy Hash: 8b6b0303c96bfbec82164a612603de16d299020e144a6f61fdedad8e58236794
                                    • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                    APIs
                                      • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                      • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                      • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                      • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                      • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                      • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                    • ExitProcess.KERNEL32 ref: 0040D80B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                    • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("$xdF$xpF
                                    • API String ID: 1861856835-1269936466
                                    • Opcode ID: 70c7a83f606aeb4d3b2596664c6662444394d7e5da5291676ce220c1718254d1
                                    • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                    • Opcode Fuzzy Hash: 70c7a83f606aeb4d3b2596664c6662444394d7e5da5291676ce220c1718254d1
                                    • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                    APIs
                                      • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                      • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                      • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                      • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                      • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                      • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                    • ExitProcess.KERNEL32 ref: 0040D454
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                    • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xdF$xpF
                                    • API String ID: 3797177996-2858374497
                                    • Opcode ID: ba2be739235a10bcefe46d66ac691a134f93cbe3676a5243af0badad04b3f09b
                                    • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                    • Opcode Fuzzy Hash: ba2be739235a10bcefe46d66ac691a134f93cbe3676a5243af0badad04b3f09b
                                    • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                    APIs
                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                    • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                    • CloseHandle.KERNEL32(00000000), ref: 00412576
                                    • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                    • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                    • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                    • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                      • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                    • Sleep.KERNEL32(000001F4), ref: 004126BD
                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                    • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                    • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                    • String ID: .exe$8SG$WDH$exepath$open$temp_
                                    • API String ID: 2649220323-436679193
                                    • Opcode ID: e35ec9723f6c30bff45695ff137c5ae5d062ae041d2d997cd07f9878392b3298
                                    • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                    • Opcode Fuzzy Hash: e35ec9723f6c30bff45695ff137c5ae5d062ae041d2d997cd07f9878392b3298
                                    • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                    APIs
                                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                    • SetEvent.KERNEL32 ref: 0041B2AA
                                    • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                    • CloseHandle.KERNEL32 ref: 0041B2CB
                                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                    • API String ID: 738084811-2094122233
                                    • Opcode ID: 0fbf736d3383e5cc5d491e169fc612faaeb06a6d706925a020033915c25ef3a5
                                    • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                    • Opcode Fuzzy Hash: 0fbf736d3383e5cc5d491e169fc612faaeb06a6d706925a020033915c25ef3a5
                                    • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                    • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                    • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                    • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Write$Create
                                    • String ID: RIFF$WAVE$data$fmt
                                    • API String ID: 1602526932-4212202414
                                    • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                    • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                    • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                    • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                    APIs
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\m4VuyJtPKi.exe,00000001,00407688,C:\Users\user\Desktop\m4VuyJtPKi.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                    • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                    • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                    • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                    • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                    • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                    • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: C:\Users\user\Desktop\m4VuyJtPKi.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                    • API String ID: 1646373207-451785896
                                    • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                    • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                    • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                    • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                      • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                      • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                      • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                    • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                    • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                    • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                    • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                    • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                    • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                    • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                    • Sleep.KERNEL32(00000064), ref: 00412ECF
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                    • String ID: /stext "$,aF$0TG$0TG$NG$NG
                                    • API String ID: 1223786279-4119708859
                                    • Opcode ID: 45bb86a03d236021c2b5709561dafa45d2a2b4b61918cb452c046091fb1f1ee4
                                    • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                    • Opcode Fuzzy Hash: 45bb86a03d236021c2b5709561dafa45d2a2b4b61918cb452c046091fb1f1ee4
                                    • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$EnvironmentVariable$_wcschr
                                    • String ID:
                                    • API String ID: 3899193279-0
                                    • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                    • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                    • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                    • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                    • __aulldiv.LIBCMT ref: 00408D88
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                    • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                    • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                                    • CloseHandle.KERNEL32(00000000), ref: 00409037
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $xdF$NG
                                    • API String ID: 3086580692-3944908133
                                    • Opcode ID: 19b51cd863cd886cd5e98cd52eeaca39aba847a63965172dc943cb0bd9086d01
                                    • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                    • Opcode Fuzzy Hash: 19b51cd863cd886cd5e98cd52eeaca39aba847a63965172dc943cb0bd9086d01
                                    • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                    APIs
                                    • Sleep.KERNEL32(00001388), ref: 0040A77B
                                      • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                      • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                      • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                      • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                      • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,00000000,00000000,00000000), ref: 0040A962
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                    • String ID: 8SG$8SG$pQG$pQG$xdF$PG$PG
                                    • API String ID: 3795512280-661585845
                                    • Opcode ID: 38bcf4da2818a4b96d4ef165a0e03b891759a86788c01250a05b120b3fa8ba34
                                    • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                    • Opcode Fuzzy Hash: 38bcf4da2818a4b96d4ef165a0e03b891759a86788c01250a05b120b3fa8ba34
                                    • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                    • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                    • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                    • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                    • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                    • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                    • String ID: EIA$\ws2_32$\wship6$getaddrinfo
                                    • API String ID: 2490988753-3348721785
                                    • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                    • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                    • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                    • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                                    APIs
                                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                    • GetCursorPos.USER32(?), ref: 0041D67A
                                    • SetForegroundWindow.USER32(?), ref: 0041D683
                                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                    • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                    • ExitProcess.KERNEL32 ref: 0041D6F6
                                    • CreatePopupMenu.USER32 ref: 0041D6FC
                                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                    • String ID: Close
                                    • API String ID: 1657328048-3535843008
                                    • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                    • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                    • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                    • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                    APIs
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,00000000,00000000,?,00474EF8,?), ref: 00404E38
                                    • SetEvent.KERNEL32(00000000), ref: 00404E43
                                    • CloseHandle.KERNEL32(00000000), ref: 00404E4C
                                    • closesocket.WS2_32(FFFFFFFF), ref: 00404E5A
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00404E91
                                    • SetEvent.KERNEL32(00000000), ref: 00404EA2
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00404EA9
                                    • SetEvent.KERNEL32(00000000), ref: 00404EBA
                                    • CloseHandle.KERNEL32(00000000), ref: 00404EBF
                                    • CloseHandle.KERNEL32(00000000), ref: 00404EC4
                                    • SetEvent.KERNEL32(00000000), ref: 00404ED1
                                    • CloseHandle.KERNEL32(00000000), ref: 00404ED6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                    • String ID: PkGNG
                                    • API String ID: 3658366068-263838557
                                    • Opcode ID: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                                    • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                    • Opcode Fuzzy Hash: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                                    • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$Info
                                    • String ID:
                                    • API String ID: 2509303402-0
                                    • Opcode ID: d11cf9d75a9b095113a5c4e7a536203a51778a2c4217635f9f2315e0a594c0ce
                                    • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                    • Opcode Fuzzy Hash: d11cf9d75a9b095113a5c4e7a536203a51778a2c4217635f9f2315e0a594c0ce
                                    • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                    APIs
                                      • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                      • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                      • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 0041374F
                                      • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00413768
                                      • Part of subcall function 00413733: RegCloseKey.ADVAPI32(?), ref: 00413773
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                    • ExitProcess.KERNEL32 ref: 0040D9FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                    • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open$xdF
                                    • API String ID: 1913171305-1736969612
                                    • Opcode ID: f46763b4e18acaa96456b3d72a4b9dd868bf5cd4392ca3d5dea1ce8ee80ce137
                                    • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                    • Opcode Fuzzy Hash: f46763b4e18acaa96456b3d72a4b9dd868bf5cd4392ca3d5dea1ce8ee80ce137
                                    • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                    APIs
                                    • connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                    • WSAGetLastError.WS2_32 ref: 00404A21
                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                    • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                    • API String ID: 994465650-3229884001
                                    • Opcode ID: 8727b35ab32fadf03299dd4f76dfb967f59a8876f9b97ca3f207b2ef3db9db61
                                    • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                    • Opcode Fuzzy Hash: 8727b35ab32fadf03299dd4f76dfb967f59a8876f9b97ca3f207b2ef3db9db61
                                    • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF
                                    APIs
                                    • ___free_lconv_mon.LIBCMT ref: 0045138A
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                      • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                    • _free.LIBCMT ref: 0045137F
                                      • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                    • _free.LIBCMT ref: 004513A1
                                    • _free.LIBCMT ref: 004513B6
                                    • _free.LIBCMT ref: 004513C1
                                    • _free.LIBCMT ref: 004513E3
                                    • _free.LIBCMT ref: 004513F6
                                    • _free.LIBCMT ref: 00451404
                                    • _free.LIBCMT ref: 0045140F
                                    • _free.LIBCMT ref: 00451447
                                    • _free.LIBCMT ref: 0045144E
                                    • _free.LIBCMT ref: 0045146B
                                    • _free.LIBCMT ref: 00451483
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                    • String ID:
                                    • API String ID: 161543041-0
                                    • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                    • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                    • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                    • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                    • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                    • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                    • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                    APIs
                                      • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                                    • GetLastError.KERNEL32 ref: 00455D6F
                                    • __dosmaperr.LIBCMT ref: 00455D76
                                    • GetFileType.KERNEL32(00000000), ref: 00455D82
                                    • GetLastError.KERNEL32 ref: 00455D8C
                                    • __dosmaperr.LIBCMT ref: 00455D95
                                    • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                    • CloseHandle.KERNEL32(?), ref: 00455EFF
                                    • GetLastError.KERNEL32 ref: 00455F31
                                    • __dosmaperr.LIBCMT ref: 00455F38
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                    • String ID: H
                                    • API String ID: 4237864984-2852464175
                                    • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                    • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                    • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                    • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,tC,0043EA74,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006), ref: 0044AD23
                                    • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006,?,?,?), ref: 0044ADA9
                                    • __alloca_probe_16.LIBCMT ref: 0044AE40
                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,A4E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                    • __freea.LIBCMT ref: 0044AEB0
                                      • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                    • __freea.LIBCMT ref: 0044AEB9
                                    • __freea.LIBCMT ref: 0044AEDE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                    • String ID: PkGNG$tC
                                    • API String ID: 3864826663-4196309852
                                    • Opcode ID: d310044fd6fb7da63cc5984238686f76bbd294774d6f437965ad6efb7d0d8ce7
                                    • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                    • Opcode Fuzzy Hash: d310044fd6fb7da63cc5984238686f76bbd294774d6f437965ad6efb7d0d8ce7
                                    • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID: \&G$\&G$`&G
                                    • API String ID: 269201875-253610517
                                    • Opcode ID: d7fd4124445081cfc97c5454a1c142f1a87d4c625925bb8ca3a98cb7b9f8d762
                                    • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                    • Opcode Fuzzy Hash: d7fd4124445081cfc97c5454a1c142f1a87d4c625925bb8ca3a98cb7b9f8d762
                                    • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 65535$udp
                                    • API String ID: 0-1267037602
                                    • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                    • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                    • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                    • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 0040AD73
                                    • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                    • GetForegroundWindow.USER32 ref: 0040AD84
                                    • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                    • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                                    • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                      • Part of subcall function 0040A671: SetEvent.KERNEL32(00000000,?,00000000,0040B245,00000000), ref: 0040A69D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                    • String ID: [${ User has been idle for $ minutes }$]
                                    • API String ID: 911427763-3954389425
                                    • Opcode ID: 3b86e5728e4c13149801c170c30695205492d28a0b9ccacfa345e82a3404f02b
                                    • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                    • Opcode Fuzzy Hash: 3b86e5728e4c13149801c170c30695205492d28a0b9ccacfa345e82a3404f02b
                                    • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F
                                    APIs
                                    • OpenClipboard.USER32 ref: 0041697C
                                    • EmptyClipboard.USER32 ref: 0041698A
                                    • CloseClipboard.USER32 ref: 00416990
                                    • OpenClipboard.USER32 ref: 00416997
                                    • GetClipboardData.USER32(0000000D), ref: 004169A7
                                    • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                    • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                    • CloseClipboard.USER32 ref: 004169BF
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                    • String ID: !D@$xdF
                                    • API String ID: 2172192267-3540039394
                                    • Opcode ID: ed6f958512443405e6a7d63718444cd0706a6b1459f0150e95220e4de6b931e6
                                    • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                    • Opcode Fuzzy Hash: ed6f958512443405e6a7d63718444cd0706a6b1459f0150e95220e4de6b931e6
                                    • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                    • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                    • __dosmaperr.LIBCMT ref: 0043A926
                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                    • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                    • __dosmaperr.LIBCMT ref: 0043A963
                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                    • __dosmaperr.LIBCMT ref: 0043A9B7
                                    • _free.LIBCMT ref: 0043A9C3
                                    • _free.LIBCMT ref: 0043A9CA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                    • String ID:
                                    • API String ID: 2441525078-0
                                    • Opcode ID: 0aa6f80fc39171c3b7bcd810793a252084de7db13dabd50598b5ae26bb1ce246
                                    • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                    • Opcode Fuzzy Hash: 0aa6f80fc39171c3b7bcd810793a252084de7db13dabd50598b5ae26bb1ce246
                                    • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                    APIs
                                    • SetEvent.KERNEL32(?,?), ref: 004054BF
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                    • TranslateMessage.USER32(?), ref: 0040557E
                                    • DispatchMessageA.USER32(?), ref: 00405589
                                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                    • String ID: CloseChat$DisplayMessage$GetMessage
                                    • API String ID: 2956720200-749203953
                                    • Opcode ID: 6c159af9cd5de4418d7d7e9ea082b42dfe52a86a5cabd9b9fe227efbe021e931
                                    • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                    • Opcode Fuzzy Hash: 6c159af9cd5de4418d7d7e9ea082b42dfe52a86a5cabd9b9fe227efbe021e931
                                    • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                    APIs
                                    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                      • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                      • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEnumInfoOpenQuerysend
                                    • String ID: (aF$,aF$xUG$xdF$NG$NG$TG
                                    • API String ID: 3114080316-4028018678
                                    • Opcode ID: fe168792520c5793dc05ba58198f1e2536225567b4564e2a0964fe8040b98874
                                    • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                    • Opcode Fuzzy Hash: fe168792520c5793dc05ba58198f1e2536225567b4564e2a0964fe8040b98874
                                    • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                    APIs
                                      • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                    • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                    • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                    • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                    • String ID: 0VG$0VG$<$@$Temp
                                    • API String ID: 1704390241-2575729100
                                    • Opcode ID: 373971d0b9ba22d7e40d57986431c1bc6258092355ab0a6007605fd9627d990e
                                    • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                    • Opcode Fuzzy Hash: 373971d0b9ba22d7e40d57986431c1bc6258092355ab0a6007605fd9627d990e
                                    • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                    • int.LIBCPMT ref: 00410EBC
                                      • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                      • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                    • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                    • __Init_thread_footer.LIBCMT ref: 00410F64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                    • String ID: ,kG$0kG$@!G
                                    • API String ID: 3815856325-312998898
                                    • Opcode ID: 691fe6bb791e4545bf7d4213160ce4246fafe9108d6505ece18590782863a067
                                    • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                    • Opcode Fuzzy Hash: 691fe6bb791e4545bf7d4213160ce4246fafe9108d6505ece18590782863a067
                                    • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ControlManager
                                    • String ID:
                                    • API String ID: 221034970-0
                                    • Opcode ID: c0082c5762a569dd6c794232c9d09aac69d1526d84f90b8f2ddcc8f825e948b5
                                    • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                    • Opcode Fuzzy Hash: c0082c5762a569dd6c794232c9d09aac69d1526d84f90b8f2ddcc8f825e948b5
                                    • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                    APIs
                                    • _free.LIBCMT ref: 004481B5
                                      • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                    • _free.LIBCMT ref: 004481C1
                                    • _free.LIBCMT ref: 004481CC
                                    • _free.LIBCMT ref: 004481D7
                                    • _free.LIBCMT ref: 004481E2
                                    • _free.LIBCMT ref: 004481ED
                                    • _free.LIBCMT ref: 004481F8
                                    • _free.LIBCMT ref: 00448203
                                    • _free.LIBCMT ref: 0044820E
                                    • _free.LIBCMT ref: 0044821C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                    • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                    • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                    • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                    APIs
                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                    • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                                    • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                    Strings
                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0041C738
                                    • DisplayName, xrefs: 0041C7CD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEnumOpen
                                    • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                    • API String ID: 1332880857-3614651759
                                    • Opcode ID: 3db40d5ffb7d5cbecbf5d8d3116ac388286af9b652dd10e74880dfaeabcecbc5
                                    • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                    • Opcode Fuzzy Hash: 3db40d5ffb7d5cbecbf5d8d3116ac388286af9b652dd10e74880dfaeabcecbc5
                                    • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Eventinet_ntoa
                                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                    • API String ID: 3578746661-3604713145
                                    • Opcode ID: 143e293dc448f1e5c105ad38ef57f5737fd13c20a1ae079dd900b3adf54cbd4b
                                    • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                    • Opcode Fuzzy Hash: 143e293dc448f1e5c105ad38ef57f5737fd13c20a1ae079dd900b3adf54cbd4b
                                    • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                    APIs
                                    • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                                    • __fassign.LIBCMT ref: 0044B4F9
                                    • __fassign.LIBCMT ref: 0044B514
                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                    • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B559
                                    • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B592
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                    • String ID: PkGNG
                                    • API String ID: 1324828854-263838557
                                    • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                    • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                    • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                    • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                    APIs
                                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                      • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                    • Sleep.KERNEL32(00000064), ref: 0041755C
                                    • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CreateDeleteExecuteShellSleep
                                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                    • API String ID: 1462127192-2001430897
                                    • Opcode ID: 7370dcfd1ebfdac3b8c20ed9e1acccdd0e251577157aa3cdcf7d6da855ebd5ea
                                    • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                    • Opcode Fuzzy Hash: 7370dcfd1ebfdac3b8c20ed9e1acccdd0e251577157aa3cdcf7d6da855ebd5ea
                                    • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                    APIs
                                    • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                    • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Users\user\Desktop\m4VuyJtPKi.exe), ref: 004074D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CurrentProcess
                                    • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                    • API String ID: 2050909247-4242073005
                                    • Opcode ID: a95593be6d9ccb52c3a82f73ffa4aa03669fa0abacf792428e02638fa8731348
                                    • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                    • Opcode Fuzzy Hash: a95593be6d9ccb52c3a82f73ffa4aa03669fa0abacf792428e02638fa8731348
                                    • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                    APIs
                                    • _strftime.LIBCMT ref: 00401D50
                                      • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                    • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                    • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                    • API String ID: 3809562944-243156785
                                    • Opcode ID: c585949dd3bb61b8991127a735a6e95ad44a9e3dd2dd4a23ca6c15d195e89e56
                                    • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                    • Opcode Fuzzy Hash: c585949dd3bb61b8991127a735a6e95ad44a9e3dd2dd4a23ca6c15d195e89e56
                                    • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                    APIs
                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                    • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                    • waveInStart.WINMM ref: 00401CFE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                    • String ID: dMG$|MG$PG
                                    • API String ID: 1356121797-532278878
                                    • Opcode ID: 6aa69cd6a01d0fe2356010249b9bd36d42245e4d7c734ee1dd99acc2b44a8f66
                                    • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                    • Opcode Fuzzy Hash: 6aa69cd6a01d0fe2356010249b9bd36d42245e4d7c734ee1dd99acc2b44a8f66
                                    • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                      • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                      • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                      • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                    • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                    • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                    • TranslateMessage.USER32(?), ref: 0041D57A
                                    • DispatchMessageA.USER32(?), ref: 0041D584
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                    • String ID: Remcos
                                    • API String ID: 1970332568-165870891
                                    • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                    • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                    • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                    • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2617abffa626f75de14076698c196880abdc2722d48b4afa90194addc5c06332
                                    • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                    • Opcode Fuzzy Hash: 2617abffa626f75de14076698c196880abdc2722d48b4afa90194addc5c06332
                                    • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                    APIs
                                    • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                    • __alloca_probe_16.LIBCMT ref: 00453F6A
                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                    • __alloca_probe_16.LIBCMT ref: 00454014
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                      • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                    • __freea.LIBCMT ref: 00454083
                                    • __freea.LIBCMT ref: 0045408F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                    • String ID:
                                    • API String ID: 201697637-0
                                    • Opcode ID: 75b0c293ea8594fd808947913ccad7943e9d879e5358a79cce92e5804a759bed
                                    • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                    • Opcode Fuzzy Hash: 75b0c293ea8594fd808947913ccad7943e9d879e5358a79cce92e5804a759bed
                                    • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                    • _memcmp.LIBVCRUNTIME ref: 004454A4
                                    • _free.LIBCMT ref: 00445515
                                    • _free.LIBCMT ref: 0044552E
                                    • _free.LIBCMT ref: 00445560
                                    • _free.LIBCMT ref: 00445569
                                    • _free.LIBCMT ref: 00445575
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorLast$_abort_memcmp
                                    • String ID: C
                                    • API String ID: 1679612858-1037565863
                                    • Opcode ID: 05701d8adb5406d1562c14b31316c91fe53ace2ea37426e70e906b20dbb38a64
                                    • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                    • Opcode Fuzzy Hash: 05701d8adb5406d1562c14b31316c91fe53ace2ea37426e70e906b20dbb38a64
                                    • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: tcp$udp
                                    • API String ID: 0-3725065008
                                    • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                    • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                    • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                    • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 004018BE
                                    • ExitThread.KERNEL32 ref: 004018F6
                                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                      • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                    • String ID: PkG$XMG$NG$NG
                                    • API String ID: 1649129571-3151166067
                                    • Opcode ID: 1f68019d026f5db955a365a40989cf1478848d523317d77e024de1e0255c4bf1
                                    • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                    • Opcode Fuzzy Hash: 1f68019d026f5db955a365a40989cf1478848d523317d77e024de1e0255c4bf1
                                    • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                                    • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                      • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                      • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000), ref: 00404BC3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                    • String ID: .part
                                    • API String ID: 1303771098-3499674018
                                    • Opcode ID: b090607113a256cb4db50371f0e2807fa5fe8ef22662c364554b32ed8325629b
                                    • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                    • Opcode Fuzzy Hash: b090607113a256cb4db50371f0e2807fa5fe8ef22662c364554b32ed8325629b
                                    • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                    APIs
                                    • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                    • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                    • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                    • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Console$Window$AllocOutputShow
                                    • String ID: Remcos v$5.1.3 Pro$CONOUT$
                                    • API String ID: 4067487056-2212855755
                                    • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                    • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                    • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                    • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                    APIs
                                    • SendInput.USER32 ref: 00419A25
                                    • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                    • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                      • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InputSend$Virtual
                                    • String ID:
                                    • API String ID: 1167301434-0
                                    • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                    • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                    • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                    • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __freea$__alloca_probe_16_free
                                    • String ID: a/p$am/pm$h{D
                                    • API String ID: 2936374016-2303565833
                                    • Opcode ID: 106f1ba053144bbac7a9d789579653696e7ba13226ab5a1e2aa5fb013921bccf
                                    • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                    • Opcode Fuzzy Hash: 106f1ba053144bbac7a9d789579653696e7ba13226ab5a1e2aa5fb013921bccf
                                    • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                    APIs
                                      • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                    • _free.LIBCMT ref: 00444E87
                                    • _free.LIBCMT ref: 00444E9E
                                    • _free.LIBCMT ref: 00444EBD
                                    • _free.LIBCMT ref: 00444ED8
                                    • _free.LIBCMT ref: 00444EEF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$AllocateHeap
                                    • String ID: KED
                                    • API String ID: 3033488037-2133951994
                                    • Opcode ID: 608df991a786fcfe36087b9db06c0af1d3846aff496c4c9c780995c6b43937c3
                                    • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                    • Opcode Fuzzy Hash: 608df991a786fcfe36087b9db06c0af1d3846aff496c4c9c780995c6b43937c3
                                    • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                    APIs
                                    • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                    • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Enum$InfoQueryValue
                                    • String ID: [regsplt]$xUG$TG
                                    • API String ID: 3554306468-1165877943
                                    • Opcode ID: 216f8fb6fede5631b8986906638379c63e93da7f4b159e3140e3e5904691cc12
                                    • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                    • Opcode Fuzzy Hash: 216f8fb6fede5631b8986906638379c63e93da7f4b159e3140e3e5904691cc12
                                    • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F918,?,00000000,?,00000001,?,000000FF,00000001,0043F918,?), ref: 004511F9
                                    • __alloca_probe_16.LIBCMT ref: 00451231
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451282
                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451294
                                    • __freea.LIBCMT ref: 0045129D
                                      • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                    • String ID: PkGNG
                                    • API String ID: 313313983-263838557
                                    • Opcode ID: 69eac8f691353b50a3156ace14c3ed2ba36efc690550522d9313693cc06751d7
                                    • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                    • Opcode Fuzzy Hash: 69eac8f691353b50a3156ace14c3ed2ba36efc690550522d9313693cc06751d7
                                    • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                    APIs
                                      • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                      • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                      • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                    • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                    • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                    • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                    • API String ID: 1133728706-4073444585
                                    • Opcode ID: 1170c70cc24d2befb54ece29b40817bddecf8c58df688f5790fffc0aa4d9cc86
                                    • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                    • Opcode Fuzzy Hash: 1170c70cc24d2befb54ece29b40817bddecf8c58df688f5790fffc0aa4d9cc86
                                    • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f00b1ad24c7174d2716471ab0982682010261559510d9071992da7a4292711ea
                                    • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                    • Opcode Fuzzy Hash: f00b1ad24c7174d2716471ab0982682010261559510d9071992da7a4292711ea
                                    • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                    APIs
                                      • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                    • _free.LIBCMT ref: 00450FC8
                                      • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                    • _free.LIBCMT ref: 00450FD3
                                    • _free.LIBCMT ref: 00450FDE
                                    • _free.LIBCMT ref: 00451032
                                    • _free.LIBCMT ref: 0045103D
                                    • _free.LIBCMT ref: 00451048
                                    • _free.LIBCMT ref: 00451053
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                    • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                    • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                    • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                    • int.LIBCPMT ref: 004111BE
                                      • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                      • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                    • std::_Facet_Register.LIBCPMT ref: 004111FE
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                    • String ID: (mG
                                    • API String ID: 2536120697-4059303827
                                    • Opcode ID: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                                    • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                    • Opcode Fuzzy Hash: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                                    • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                    APIs
                                    • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                    • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastValue___vcrt_
                                    • String ID:
                                    • API String ID: 3852720340-0
                                    • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                    • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                    • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                    • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                    APIs
                                    • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\m4VuyJtPKi.exe), ref: 0040760B
                                      • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                      • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                    • CoUninitialize.OLE32 ref: 00407664
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InitializeObjectUninitialize_wcslen
                                    • String ID: C:\Users\user\Desktop\m4VuyJtPKi.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                    • API String ID: 3851391207-178633405
                                    • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                    • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                    • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                    • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                    APIs
                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                    • GetLastError.KERNEL32 ref: 0040BB22
                                    Strings
                                    • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                    • UserProfile, xrefs: 0040BAE8
                                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                    • [Chrome Cookies not found], xrefs: 0040BB3C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteErrorFileLast
                                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                    • API String ID: 2018770650-304995407
                                    • Opcode ID: 40cbd1d017226246a01c6e55be9682f761922b1e96e2188b9bd7b4daff8d9f2f
                                    • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                    • Opcode Fuzzy Hash: 40cbd1d017226246a01c6e55be9682f761922b1e96e2188b9bd7b4daff8d9f2f
                                    • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: SG$C:\Users\user\Desktop\m4VuyJtPKi.exe$xdF
                                    • API String ID: 0-3458736603
                                    • Opcode ID: 9ede8093406f94065d2c8ec1b346fdbac0eadabd7f062fb770d3fd7eb18269e7
                                    • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                    • Opcode Fuzzy Hash: 9ede8093406f94065d2c8ec1b346fdbac0eadabd7f062fb770d3fd7eb18269e7
                                    • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                    APIs
                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002), ref: 004433FA
                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                                    • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG), ref: 00443430
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressFreeHandleLibraryModuleProc
                                    • String ID: CorExitProcess$PkGNG$mscoree.dll
                                    • API String ID: 4061214504-213444651
                                    • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                    • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                    • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                    • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                    APIs
                                    • _free.LIBCMT ref: 00444106
                                      • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                    • _free.LIBCMT ref: 00444118
                                    • _free.LIBCMT ref: 0044412B
                                    • _free.LIBCMT ref: 0044413C
                                    • _free.LIBCMT ref: 0044414D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID: 8Kc
                                    • API String ID: 776569668-303024918
                                    • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                    • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                    • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                    • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                    APIs
                                    • __allrem.LIBCMT ref: 0043ACE9
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                    • __allrem.LIBCMT ref: 0043AD1C
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                    • __allrem.LIBCMT ref: 0043AD51
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                    • String ID:
                                    • API String ID: 1992179935-0
                                    • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                    • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                    • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                    • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                    APIs
                                    • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                      • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: H_prologSleep
                                    • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                    • API String ID: 3469354165-3054508432
                                    • Opcode ID: f6eed5a025c33a72db7f2e3148006b368f6608b0559b856221c9dc04da3fa1ca
                                    • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                    • Opcode Fuzzy Hash: f6eed5a025c33a72db7f2e3148006b368f6608b0559b856221c9dc04da3fa1ca
                                    • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                    APIs
                                      • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                    • SetLastError.KERNEL32(000000C1,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                    • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                                    • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,00000000), ref: 00411E04
                                      • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00411CEE
                                    • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,00000000), ref: 00411E4B
                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000), ref: 00411E52
                                    • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411F65
                                      • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                                      • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                    • String ID:
                                    • API String ID: 3950776272-0
                                    • Opcode ID: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                                    • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                    • Opcode Fuzzy Hash: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                                    • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __cftoe
                                    • String ID:
                                    • API String ID: 4189289331-0
                                    • Opcode ID: d4cf2da0f410fbcc7cbee81c0db44e16d3fe49bd9b5005f3a7d0ddff8059c7c7
                                    • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                    • Opcode Fuzzy Hash: d4cf2da0f410fbcc7cbee81c0db44e16d3fe49bd9b5005f3a7d0ddff8059c7c7
                                    • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                    • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                    • String ID:
                                    • API String ID: 493672254-0
                                    • Opcode ID: 91938c1d555d364b93c99e00d8beeb13e1151d7f412d7edf767a6a0184c3eeef
                                    • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                    • Opcode Fuzzy Hash: 91938c1d555d364b93c99e00d8beeb13e1151d7f412d7edf767a6a0184c3eeef
                                    • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __alldvrm$_strrchr
                                    • String ID: PkGNG
                                    • API String ID: 1036877536-263838557
                                    • Opcode ID: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                    • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                    • Opcode Fuzzy Hash: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                    • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                    APIs
                                    • GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                    • _free.LIBCMT ref: 004482CC
                                    • _free.LIBCMT ref: 004482F4
                                    • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                    • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                    • _abort.LIBCMT ref: 00448313
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free$_abort
                                    • String ID:
                                    • API String ID: 3160817290-0
                                    • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                    • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                    • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                    • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ControlManager
                                    • String ID:
                                    • API String ID: 221034970-0
                                    • Opcode ID: 966b63bd912de40b5b615a00da15e5d8939a9a4c78db0212e4922df61029cb32
                                    • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                    • Opcode Fuzzy Hash: 966b63bd912de40b5b615a00da15e5d8939a9a4c78db0212e4922df61029cb32
                                    • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                    • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ControlManager
                                    • String ID:
                                    • API String ID: 221034970-0
                                    • Opcode ID: 881ec567a8ecab9b5ae46dea35bb7569396cf57d6f42af84948da6ead9762d9b
                                    • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                    • Opcode Fuzzy Hash: 881ec567a8ecab9b5ae46dea35bb7569396cf57d6f42af84948da6ead9762d9b
                                    • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                    • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ControlManager
                                    • String ID:
                                    • API String ID: 221034970-0
                                    • Opcode ID: 88b0ec0b9de38ee72874faffadaad7a58cf941c8d18bd5a35ca229f780ffab3e
                                    • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                    • Opcode Fuzzy Hash: 88b0ec0b9de38ee72874faffadaad7a58cf941c8d18bd5a35ca229f780ffab3e
                                    • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CountEventTick
                                    • String ID: !D@$,aF$NG
                                    • API String ID: 180926312-2771706352
                                    • Opcode ID: 97f6934a460d4030c64ae9dada3ae47825ea3d9e99520bd22a9bf9ee1c3390b4
                                    • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                    • Opcode Fuzzy Hash: 97f6934a460d4030c64ae9dada3ae47825ea3d9e99520bd22a9bf9ee1c3390b4
                                    • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: PkGNG
                                    • API String ID: 0-263838557
                                    • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                    • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                    • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                    • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                    • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00404DD2
                                    • CloseHandle.KERNEL32(00000000), ref: 00404DDB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                    • String ID: PkGNG
                                    • API String ID: 3360349984-263838557
                                    • Opcode ID: fd9625d3d3dd930e6efe510565c92d19d8a09afb7a611057408a21d48d515413
                                    • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                    • Opcode Fuzzy Hash: fd9625d3d3dd930e6efe510565c92d19d8a09afb7a611057408a21d48d515413
                                    • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\m4VuyJtPKi.exe,00000104), ref: 00443515
                                    • _free.LIBCMT ref: 004435E0
                                    • _free.LIBCMT ref: 004435EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$FileModuleName
                                    • String ID: C:\Users\user\Desktop\m4VuyJtPKi.exe$`&b
                                    • API String ID: 2506810119-3384513855
                                    • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                    • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                    • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                    • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                    APIs
                                    • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                    • wsprintfW.USER32 ref: 0040B22E
                                      • Part of subcall function 0040A671: SetEvent.KERNEL32(00000000,?,00000000,0040B245,00000000), ref: 0040A69D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EventLocalTimewsprintf
                                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                    • API String ID: 1497725170-248792730
                                    • Opcode ID: 590076fe8f1494f98079e3cf8323dae9744f019b5c0a7c96ae8eecf56c720eef
                                    • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                    • Opcode Fuzzy Hash: 590076fe8f1494f98079e3cf8323dae9744f019b5c0a7c96ae8eecf56c720eef
                                    • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                    • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                    • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleSizeSleep
                                    • String ID: XQG
                                    • API String ID: 1958988193-3606453820
                                    • Opcode ID: d6ef6c45787fb92e5c60d55e281e71fdec3153d0b7ddf81c3844b29d7b306009
                                    • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                    • Opcode Fuzzy Hash: d6ef6c45787fb92e5c60d55e281e71fdec3153d0b7ddf81c3844b29d7b306009
                                    • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                                    APIs
                                    • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                    • GetLastError.KERNEL32 ref: 0041D611
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ClassCreateErrorLastRegisterWindow
                                    • String ID: 0$MsgWindowClass
                                    • API String ID: 2877667751-2410386613
                                    • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                    • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                    • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                    • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                    APIs
                                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                    • CloseHandle.KERNEL32(?), ref: 004077E5
                                    • CloseHandle.KERNEL32(?), ref: 004077EA
                                    Strings
                                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                    • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$CreateProcess
                                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                    • API String ID: 2922976086-4183131282
                                    • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                    • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                    • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                    • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                                    • SetEvent.KERNEL32(?), ref: 0040512C
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                                    • CloseHandle.KERNEL32(?), ref: 00405140
                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                    • String ID: KeepAlive | Disabled
                                    • API String ID: 2993684571-305739064
                                    • Opcode ID: 5f844ff6b6fc0bb967d4da060d76b4d02bcb8b38bb6a94136aac1dbe49d058d6
                                    • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                    • Opcode Fuzzy Hash: 5f844ff6b6fc0bb967d4da060d76b4d02bcb8b38bb6a94136aac1dbe49d058d6
                                    • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                    APIs
                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                    • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                    • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                    • Sleep.KERNEL32(00002710), ref: 0041AE98
                                    • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: PlaySound$HandleLocalModuleSleepTime
                                    • String ID: Alarm triggered
                                    • API String ID: 614609389-2816303416
                                    • Opcode ID: 7188bb29afe99ed737fa2488fa92c72a53281f38882f129766295ba366a65c2c
                                    • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                    • Opcode Fuzzy Hash: 7188bb29afe99ed737fa2488fa92c72a53281f38882f129766295ba366a65c2c
                                    • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                    APIs
                                    • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                    • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                                    • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                                    • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                                    Strings
                                    • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Console$AttributeText$BufferHandleInfoScreen
                                    • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                    • API String ID: 3024135584-2418719853
                                    • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                    • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                    • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                    • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                                    • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                    • Opcode Fuzzy Hash: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                                    • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                    APIs
                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                    • _free.LIBCMT ref: 0044943D
                                      • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                    • _free.LIBCMT ref: 00449609
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                    • String ID:
                                    • API String ID: 1286116820-0
                                    • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                    • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                    • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                    • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                    APIs
                                      • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                      • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                    • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                      • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                      • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C096
                                      • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                      • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                    • String ID:
                                    • API String ID: 2180151492-0
                                    • Opcode ID: 44cf522013d9a60f8e2182bec42c266b3aa3e6e865e99eeb343e227a1f5199b4
                                    • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                    • Opcode Fuzzy Hash: 44cf522013d9a60f8e2182bec42c266b3aa3e6e865e99eeb343e227a1f5199b4
                                    • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                    • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                    • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                    • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                      • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                    • _free.LIBCMT ref: 0044F43F
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                    • String ID:
                                    • API String ID: 336800556-0
                                    • Opcode ID: 5500135b4103b87c343acc58efff57d349ffb1ffd5e47bf571a7f4768ca97117
                                    • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                    • Opcode Fuzzy Hash: 5500135b4103b87c343acc58efff57d349ffb1ffd5e47bf571a7f4768ca97117
                                    • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                    APIs
                                    • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4DE
                                    • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4EA
                                    • WriteFile.KERNEL32(00000000,00000000,00000000,00406FC0,00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4FB
                                    • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C508
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseHandle$CreatePointerWrite
                                    • String ID:
                                    • API String ID: 1852769593-0
                                    • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                    • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                    • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                    • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                                    APIs
                                    • GetLastError.KERNEL32(?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044831E
                                    • _free.LIBCMT ref: 00448353
                                    • _free.LIBCMT ref: 0044837A
                                    • SetLastError.KERNEL32(00000000), ref: 00448387
                                    • SetLastError.KERNEL32(00000000), ref: 00448390
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free
                                    • String ID:
                                    • API String ID: 3170660625-0
                                    • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                    • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                    • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                    • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                    APIs
                                    • _free.LIBCMT ref: 00450A54
                                      • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                    • _free.LIBCMT ref: 00450A66
                                    • _free.LIBCMT ref: 00450A78
                                    • _free.LIBCMT ref: 00450A8A
                                    • _free.LIBCMT ref: 00450A9C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                    • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                    • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                    • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: PkGNG
                                    • API String ID: 0-263838557
                                    • Opcode ID: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                                    • Instruction ID: da8fb74aa53f7b39327717419ea6793f6800af9799f3d5c2cf6102f7e15971fb
                                    • Opcode Fuzzy Hash: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                                    • Instruction Fuzzy Hash: 1451C171D00209AAEF109FA5D885BAFBBB8EF45314F14015FE905A7291CB38D911CBA9
                                    APIs
                                    • _strpbrk.LIBCMT ref: 0044E7B8
                                    • _free.LIBCMT ref: 0044E8D5
                                      • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,?,?,?,?,?,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                                      • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417), ref: 0043BD8C
                                      • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000), ref: 0043BD93
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                    • String ID: *?$.
                                    • API String ID: 2812119850-3972193922
                                    • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                    • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                    • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                    • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                    APIs
                                    • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                      • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                      • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFileKeyboardLayoutNameconnectsend
                                    • String ID: XQG$NG$PG
                                    • API String ID: 1634807452-3565412412
                                    • Opcode ID: e4a9d5c560b69fd78b4aefd9c555e9a05f5e8dfaddfa74acecea5ef8592acc29
                                    • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                    • Opcode Fuzzy Hash: e4a9d5c560b69fd78b4aefd9c555e9a05f5e8dfaddfa74acecea5ef8592acc29
                                    • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                    APIs
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BBFE,?,00000000,FF8BC35D), ref: 0044B952
                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B980
                                    • GetLastError.KERNEL32 ref: 0044B9B1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharErrorFileLastMultiWideWrite
                                    • String ID: PkGNG
                                    • API String ID: 2456169464-263838557
                                    • Opcode ID: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                                    • Instruction ID: 31ac96f82a5847659344ef20b41dc67af7a50504b34fbd786f6314a6cc22fa3b
                                    • Opcode Fuzzy Hash: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                                    • Instruction Fuzzy Hash: B13161B5A102199FDB14CF59DD819EAB7B9FB08305F0444BEE90AD7251D734ED80CBA4
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                      • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                      • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                      • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                      • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                    • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                    • String ID: /sort "Visit Time" /stext "$0NG
                                    • API String ID: 368326130-3219657780
                                    • Opcode ID: fe1dcbe43dd3634a87855b23991002f64a6e7fb6b5b63a54aa9eaae6f1d8b0cb
                                    • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                    • Opcode Fuzzy Hash: fe1dcbe43dd3634a87855b23991002f64a6e7fb6b5b63a54aa9eaae6f1d8b0cb
                                    • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                      • Part of subcall function 0044F0F7: _abort.LIBCMT ref: 0044F129
                                      • Part of subcall function 0044F0F7: _free.LIBCMT ref: 0044F15D
                                      • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                    • _free.LIBCMT ref: 0044F050
                                    • _free.LIBCMT ref: 0044F086
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorLast_abort
                                    • String ID: 8Kc$8Kc
                                    • API String ID: 2991157371-2146691348
                                    • Opcode ID: 71aca08545de7bb044ad328f8c00ee0f305eefffa63378c1bf8952336139cfaa
                                    • Instruction ID: a9f826519387c1ac895116d2974c89b4af6d1f604a138ae73dd4863203302c4b
                                    • Opcode Fuzzy Hash: 71aca08545de7bb044ad328f8c00ee0f305eefffa63378c1bf8952336139cfaa
                                    • Instruction Fuzzy Hash: 2D31D371900104AFEB10EB69D441B9A77F4EF81325F2540AFE5049B2A3DB7A5D44CB58
                                    APIs
                                      • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                    • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Init_thread_footer__onexit
                                    • String ID: [End of clipboard]$[Text copied to clipboard]$xdF
                                    • API String ID: 1881088180-1310280921
                                    • Opcode ID: 73f637bbd48b1bf229094fefa832032d007dc839beb89d63076b170c08ac48f7
                                    • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                    • Opcode Fuzzy Hash: 73f637bbd48b1bf229094fefa832032d007dc839beb89d63076b170c08ac48f7
                                    • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                    APIs
                                    • _wcslen.LIBCMT ref: 00416330
                                      • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                      • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                      • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                      • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _wcslen$CloseCreateValue
                                    • String ID: !D@$okmode$PG
                                    • API String ID: 3411444782-3370592832
                                    • Opcode ID: 60448b0e8e1302300a726850042eb40e83559f5fb1ddc2c058d9214b554c3234
                                    • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                    • Opcode Fuzzy Hash: 60448b0e8e1302300a726850042eb40e83559f5fb1ddc2c058d9214b554c3234
                                    • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                    APIs
                                      • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                                    Strings
                                    • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                    • API String ID: 1174141254-1980882731
                                    • Opcode ID: 4c3ec1025f380f0846f8e1dc8bc4a2843c94f1a3baaeaf19e1a0ff68f190b872
                                    • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                    • Opcode Fuzzy Hash: 4c3ec1025f380f0846f8e1dc8bc4a2843c94f1a3baaeaf19e1a0ff68f190b872
                                    • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                    APIs
                                      • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                                    Strings
                                    • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                    • API String ID: 1174141254-1980882731
                                    • Opcode ID: bc9d1e2df797dab518334d9674a311e448b3e3a06a0a38ddc3fca4162ebd7fce
                                    • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                    • Opcode Fuzzy Hash: bc9d1e2df797dab518334d9674a311e448b3e3a06a0a38ddc3fca4162ebd7fce
                                    • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                    APIs
                                    • CreateThread.KERNEL32(00000000,00000000,0040A2B8,004750F0,00000000,00000000), ref: 0040A239
                                    • CreateThread.KERNEL32(00000000,00000000,0040A2A2,004750F0,00000000,00000000), ref: 0040A249
                                    • CreateThread.KERNEL32(00000000,00000000,0040A2C4,004750F0,00000000,00000000), ref: 0040A255
                                      • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                      • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateThread$LocalTimewsprintf
                                    • String ID: Offline Keylogger Started
                                    • API String ID: 465354869-4114347211
                                    • Opcode ID: c9dadc1da63af5f6e8376356dc394f03abfd93875fd3821fa0c6c3cb1e5cb8ec
                                    • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                    • Opcode Fuzzy Hash: c9dadc1da63af5f6e8376356dc394f03abfd93875fd3821fa0c6c3cb1e5cb8ec
                                    • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                    APIs
                                      • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                      • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                    • CreateThread.KERNEL32(00000000,00000000,0040A2A2,?,00000000,00000000), ref: 0040AFA9
                                    • CreateThread.KERNEL32(00000000,00000000,0040A2C4,?,00000000,00000000), ref: 0040AFB5
                                    • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateThread$LocalTime$wsprintf
                                    • String ID: Online Keylogger Started
                                    • API String ID: 112202259-1258561607
                                    • Opcode ID: bd734070be6d9fd3b2319cc8bc141e303554b7076250c8a214208a99cb0c267f
                                    • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                    • Opcode Fuzzy Hash: bd734070be6d9fd3b2319cc8bc141e303554b7076250c8a214208a99cb0c267f
                                    • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                    APIs
                                    • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocalTime
                                    • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                                    • API String ID: 481472006-3277280411
                                    • Opcode ID: 6d65b35793c1f0ee1ca33c8ff48bd585d8f9b96005ee3902c82eeebd0cb3c058
                                    • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                    • Opcode Fuzzy Hash: 6d65b35793c1f0ee1ca33c8ff48bd585d8f9b96005ee3902c82eeebd0cb3c058
                                    • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                    APIs
                                    • GetLocalTime.KERNEL32(?), ref: 00404F81
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                    • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                                    Strings
                                    • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Create$EventLocalThreadTime
                                    • String ID: KeepAlive | Enabled | Timeout:
                                    • API String ID: 2532271599-1507639952
                                    • Opcode ID: ed66be453417c099092d2c881b0bf4f778d424254e45a7ba9590b70ea61d3fea
                                    • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                    • Opcode Fuzzy Hash: ed66be453417c099092d2c881b0bf4f778d424254e45a7ba9590b70ea61d3fea
                                    • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                    APIs
                                    • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                                    • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: CryptUnprotectData$crypt32
                                    • API String ID: 2574300362-2380590389
                                    • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                    • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                    • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                    • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                    APIs
                                    • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C382,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C30C
                                    • GetLastError.KERNEL32 ref: 0044C316
                                    • __dosmaperr.LIBCMT ref: 0044C31D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorFileLastPointer__dosmaperr
                                    • String ID: PkGNG
                                    • API String ID: 2336955059-263838557
                                    • Opcode ID: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                                    • Instruction ID: 8193a85edd99f1e073baf55791db2896ff72ac9ff19ac05387a69161c0de0417
                                    • Opcode Fuzzy Hash: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                                    • Instruction Fuzzy Hash: FB019032A11108BBDB01DFDDDC4586E7B19EB81320B28034EFD2097280EAB4DD119794
                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                    • CloseHandle.KERNEL32(?), ref: 004051CA
                                    • SetEvent.KERNEL32(?), ref: 004051D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEventHandleObjectSingleWait
                                    • String ID: Connection Timeout
                                    • API String ID: 2055531096-499159329
                                    • Opcode ID: 1208aa0f1ec4f625f2dd1105fdd9db146f5aac58113692a75bb52ce6743b9de6
                                    • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                    • Opcode Fuzzy Hash: 1208aa0f1ec4f625f2dd1105fdd9db146f5aac58113692a75bb52ce6743b9de6
                                    • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                    APIs
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Exception@8Throw
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2005118841-1866435925
                                    • Opcode ID: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                                    • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                    • Opcode Fuzzy Hash: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                                    • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                    APIs
                                    • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,00404A40), ref: 0041CB9A
                                    • LocalFree.KERNEL32(?,?), ref: 0041CBC0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FormatFreeLocalMessage
                                    • String ID: @J@$PkGNG
                                    • API String ID: 1427518018-1416487119
                                    • Opcode ID: 169e295061165c204340d448f50400884db8202b0d92508f4913cf451efee3b2
                                    • Instruction ID: 923000db8f6a2d31ebee0df48ef62036c6bc2ff20d3f060cbaedccf048ea6ec3
                                    • Opcode Fuzzy Hash: 169e295061165c204340d448f50400884db8202b0d92508f4913cf451efee3b2
                                    • Instruction Fuzzy Hash: 34F0A930B00219A6DF14A766DC4ADFF772DDB44305B10407FB605B21D1DE785D059659
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                      • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                      • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                    • String ID: bad locale name
                                    • API String ID: 3628047217-1405518554
                                    • Opcode ID: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                                    • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                    • Opcode Fuzzy Hash: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                                    • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                    APIs
                                    • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                    • ShowWindow.USER32(00000009), ref: 00416C9C
                                    • SetForegroundWindow.USER32 ref: 00416CA8
                                      • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                      • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                      • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                      • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                    • String ID: !D@
                                    • API String ID: 186401046-604454484
                                    • Opcode ID: b3bf2abe11f2753584a36420ae4e649aa3d370534bfc6fae2faf3e21f9dcef6a
                                    • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                    • Opcode Fuzzy Hash: b3bf2abe11f2753584a36420ae4e649aa3d370534bfc6fae2faf3e21f9dcef6a
                                    • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                    APIs
                                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID: /C $cmd.exe$open
                                    • API String ID: 587946157-3896048727
                                    • Opcode ID: c9d8b598d3fd4de2fef92b814dea4f819fb2a27baf8bb84222376f6534362272
                                    • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                    • Opcode Fuzzy Hash: c9d8b598d3fd4de2fef92b814dea4f819fb2a27baf8bb84222376f6534362272
                                    • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                    • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                    • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                    • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                    APIs
                                    Strings
                                    • Cleared browsers logins and cookies., xrefs: 0040C130
                                    • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep
                                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                    • API String ID: 3472027048-1236744412
                                    • Opcode ID: 254821c4e88e046c1dba0c8825a6e40866b3ac0b08979b4afd60d23f7ce0d7ec
                                    • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                    • Opcode Fuzzy Hash: 254821c4e88e046c1dba0c8825a6e40866b3ac0b08979b4afd60d23f7ce0d7ec
                                    • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                    APIs
                                      • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 0041374F
                                      • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00413768
                                      • Part of subcall function 00413733: RegCloseKey.ADVAPI32(?), ref: 00413773
                                    • Sleep.KERNEL32(00000BB8), ref: 004127B5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQuerySleepValue
                                    • String ID: 8SG$exepath$xdF
                                    • API String ID: 4119054056-3578471011
                                    • Opcode ID: 7af087c9dbd06382a8b67455a26849064df6f45d73dc15ae608225e39718d2a5
                                    • Instruction ID: 51bf296395b05d3efeb7b41814c334b1d8e13e95dfba71b8de44539041ec8c28
                                    • Opcode Fuzzy Hash: 7af087c9dbd06382a8b67455a26849064df6f45d73dc15ae608225e39718d2a5
                                    • Instruction Fuzzy Hash: 3521F4A1B003042BD604B6365D4AAAF724D8B80318F40897FBA56E72D3DFBC9D45826D
                                    APIs
                                      • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                      • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                      • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                                    • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                    • Sleep.KERNEL32(00000064), ref: 0040A638
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Window$SleepText$ForegroundLength
                                    • String ID: [ $ ]
                                    • API String ID: 3309952895-93608704
                                    • Opcode ID: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                                    • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                    • Opcode Fuzzy Hash: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                                    • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: SystemTimes$Sleep__aulldiv
                                    • String ID:
                                    • API String ID: 188215759-0
                                    • Opcode ID: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                    • Instruction ID: 634937a4cd8d43e921f59083ecd148feda9109121ee8127270144c35be039893
                                    • Opcode Fuzzy Hash: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                    • Instruction Fuzzy Hash: D01133B35043456BC304EAB5CD85DEF779CEBC4358F040A3EF64982061EE29E94986A6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                    • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                    • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                    • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                    • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                    • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                    • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                    APIs
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                    • GetLastError.KERNEL32(?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad$ErrorLast
                                    • String ID:
                                    • API String ID: 3177248105-0
                                    • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                    • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                    • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                    • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                    APIs
                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                      • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                    • _UnwindNestedFrames.LIBCMT ref: 00439911
                                    • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                    • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                    • String ID:
                                    • API String ID: 2633735394-0
                                    • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                    • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                    • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                    • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                    APIs
                                    • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                                    • GetSystemMetrics.USER32(0000004D), ref: 00419431
                                    • GetSystemMetrics.USER32(0000004E), ref: 00419437
                                    • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: MetricsSystem
                                    • String ID:
                                    • API String ID: 4116985748-0
                                    • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                    • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                    • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                    • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                    APIs
                                    • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                    • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                      • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                    • String ID:
                                    • API String ID: 1761009282-0
                                    • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                    • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                    • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                    • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                    APIs
                                    • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorHandling__start
                                    • String ID: pow
                                    • API String ID: 3213639722-2276729525
                                    • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                    • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                    • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                    • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                    APIs
                                    • GdiplusStartup.GDIPLUS(00474ACC,?,00000000,00000000), ref: 004187FA
                                      • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: GdiplusStartupconnectsend
                                    • String ID: ,aF$NG
                                    • API String ID: 1957403310-2168067942
                                    • Opcode ID: 6faaadbd3ead43c92726fa02e1435eb68f61b0cdfffa7847a1267ec095d6f1f8
                                    • Instruction ID: 646e85ae029ebb21aec6d49858a727e037fa7bb3a6359959f193cd142bf324ca
                                    • Opcode Fuzzy Hash: 6faaadbd3ead43c92726fa02e1435eb68f61b0cdfffa7847a1267ec095d6f1f8
                                    • Instruction Fuzzy Hash: 8E41D4713042015BC208FB22D892ABF7396ABC0358F50493FF54A672D2EF7C5D4A869E
                                    APIs
                                    • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 00449F8F
                                    • GetLastError.KERNEL32 ref: 00449FAB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharErrorLastMultiWide
                                    • String ID: PkGNG
                                    • API String ID: 203985260-263838557
                                    • Opcode ID: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                                    • Instruction ID: e4919e29a80df6b7ced925805d10dfcffaa1b378e184719e11b938f1b8f94c7b
                                    • Opcode Fuzzy Hash: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                                    • Instruction Fuzzy Hash: 2331E430200201ABFB21EF56C845BAB7768EF45721F15016BF815C7391DB38CD45E7A9
                                    APIs
                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418AF9
                                      • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                    • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                                      • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                      • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                    • String ID: image/jpeg
                                    • API String ID: 1291196975-3785015651
                                    • Opcode ID: f4d343ee3105d0ca7f694a1c3c1cd31302a14f8eac364085ad57c9062bbf9fd1
                                    • Instruction ID: 4d0b5c8bb5c89928ccad9adfa1773eea8e0f3015d74a4b244142dc53e7d0f70c
                                    • Opcode Fuzzy Hash: f4d343ee3105d0ca7f694a1c3c1cd31302a14f8eac364085ad57c9062bbf9fd1
                                    • Instruction Fuzzy Hash: B5316D71604300AFC301EF65C884DAFBBE9EF8A304F00496EF985A7251DB7999048BA6
                                    APIs
                                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: ACP$OCP
                                    • API String ID: 0-711371036
                                    • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                    • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                    • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                    • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                    APIs
                                    • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BBEE,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B85B
                                    • GetLastError.KERNEL32 ref: 0044B884
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorFileLastWrite
                                    • String ID: PkGNG
                                    • API String ID: 442123175-263838557
                                    • Opcode ID: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                                    • Instruction ID: 9972a58bdd01e134d13becd973f3089a2f7b3635eb9ddb95e5d59f4384582b5e
                                    • Opcode Fuzzy Hash: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                                    • Instruction Fuzzy Hash: B2316F31A00619DBCB24DF59DD8099AF3F9FF48301B1485AAE909D7261E734ED81CBA8
                                    APIs
                                    • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BC0E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B76D
                                    • GetLastError.KERNEL32 ref: 0044B796
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorFileLastWrite
                                    • String ID: PkGNG
                                    • API String ID: 442123175-263838557
                                    • Opcode ID: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                                    • Instruction ID: c865f2f287ade0309940dd9d446f9ab1351fd896516eb6f8948e0fb5ca6ebdce
                                    • Opcode Fuzzy Hash: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                                    • Instruction Fuzzy Hash: 69219435600219DFDB14CF69D980BEAB3F9EB48312F1048AAE94AD7251D734ED85CB64
                                    APIs
                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BE5
                                      • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418C0A
                                      • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                      • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                    • String ID: image/png
                                    • API String ID: 1291196975-2966254431
                                    • Opcode ID: c5080055e3ee20b0f86b16816e754ddae04249a5e40f1d4050c67216b79272cb
                                    • Instruction ID: 3c300d9a249dbea914adbc87700f03e6b767f6cab6163cd9bde1f728fb98d86d
                                    • Opcode Fuzzy Hash: c5080055e3ee20b0f86b16816e754ddae04249a5e40f1d4050c67216b79272cb
                                    • Instruction Fuzzy Hash: ED219071204211AFC701AB61CC88CBFBBACEFCA754F10052EF54693261DB399955CBA6
                                    APIs
                                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                    Strings
                                    • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocalTime
                                    • String ID: KeepAlive | Enabled | Timeout:
                                    • API String ID: 481472006-1507639952
                                    • Opcode ID: 6a836f28e3d82f5956495b1ed0a609d29bb77af81d72085e220fa4010b761da1
                                    • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                    • Opcode Fuzzy Hash: 6a836f28e3d82f5956495b1ed0a609d29bb77af81d72085e220fa4010b761da1
                                    • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                    APIs
                                    • Sleep.KERNEL32 ref: 0041667B
                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DownloadFileSleep
                                    • String ID: !D@
                                    • API String ID: 1931167962-604454484
                                    • Opcode ID: dbdae685cffb112d4a3bb88a9cd457fc8865c886a06674729277bef016e57e85
                                    • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                    • Opcode Fuzzy Hash: dbdae685cffb112d4a3bb88a9cd457fc8865c886a06674729277bef016e57e85
                                    • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                    APIs
                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: alarm.wav$hYG
                                    • API String ID: 1174141254-2782910960
                                    • Opcode ID: 5deaab9b6fa6feb18b2b183ffd6011baab72bcfad539331250a37a5e623a0336
                                    • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                    • Opcode Fuzzy Hash: 5deaab9b6fa6feb18b2b183ffd6011baab72bcfad539331250a37a5e623a0336
                                    • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                    APIs
                                      • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                      • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                    • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                    • UnhookWindowsHookEx.USER32 ref: 0040B102
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                    • String ID: Online Keylogger Stopped
                                    • API String ID: 1623830855-1496645233
                                    • Opcode ID: f6bc9a4f1be241058c79678320ae9d5f7e84be69635fd5d7982f5d6ce4aad990
                                    • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                    • Opcode Fuzzy Hash: f6bc9a4f1be241058c79678320ae9d5f7e84be69635fd5d7982f5d6ce4aad990
                                    • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                    APIs
                                    • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,A4E85006,00000001,?,0043CEA5), ref: 00448CA4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: String
                                    • String ID: LCMapStringEx$PkGNG
                                    • API String ID: 2568140703-1065776982
                                    • Opcode ID: aac5d351483de452061b997450265c1da9567a4c5720285b7a7b965a3286f227
                                    • Instruction ID: c3f282dcf0fd97a5c368a601407465e3bede0a00add2935535d0592c00eac712
                                    • Opcode Fuzzy Hash: aac5d351483de452061b997450265c1da9567a4c5720285b7a7b965a3286f227
                                    • Instruction Fuzzy Hash: 3001253254120CFBCF02AF91DD02EEE7F66EF08751F04416AFE1965161CA3A8971EB99
                                    APIs
                                      • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                    • _abort.LIBCMT ref: 0044F129
                                    • _free.LIBCMT ref: 0044F15D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_abort_free
                                    • String ID: 8Kc
                                    • API String ID: 289325740-303024918
                                    • Opcode ID: 870bd59091670ef6f85687353f23d3fa7adaacf8e57ceb1d53a868e14bc6891b
                                    • Instruction ID: a8e40e627a719db10bf70d85eeadc0c4c2fb790701f4ec7f842983f146219858
                                    • Opcode Fuzzy Hash: 870bd59091670ef6f85687353f23d3fa7adaacf8e57ceb1d53a868e14bc6891b
                                    • Instruction Fuzzy Hash: 0501A1B1D01A21DBEB31AFA9D84265EB3A0BF04720B19012FE51463391CB386D46CBCE
                                    APIs
                                    • waveInPrepareHeader.WINMM(0063E9C0,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                    • waveInAddBuffer.WINMM(0063E9C0,00000020,?,00000000,00401A15), ref: 0040185F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: wave$BufferHeaderPrepare
                                    • String ID: XMG
                                    • API String ID: 2315374483-813777761
                                    • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                    • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                    • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                    • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID: $G
                                    • API String ID: 269201875-4251033865
                                    • Opcode ID: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                                    • Instruction ID: 4a6f060c21597e0392f33703011e6e0157da39883ddad7ec559e06d861eb6f1f
                                    • Opcode Fuzzy Hash: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                                    • Instruction Fuzzy Hash: 64E0E532A0152014F6713A3B6D1665B45C68BC1B3AF22423FF425962C2DFAC8946516E
                                    APIs
                                    • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocaleValid
                                    • String ID: IsValidLocaleName$kKD
                                    • API String ID: 1901932003-3269126172
                                    • Opcode ID: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                    • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                    • Opcode Fuzzy Hash: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                    • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                    APIs
                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                    • API String ID: 1174141254-4188645398
                                    • Opcode ID: ac52d1f9c14367a84aa36a4c80d9fd0779ec883e7d0dba5bfe15f38b2d4e1174
                                    • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                    • Opcode Fuzzy Hash: ac52d1f9c14367a84aa36a4c80d9fd0779ec883e7d0dba5bfe15f38b2d4e1174
                                    • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                    APIs
                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                    • API String ID: 1174141254-2800177040
                                    • Opcode ID: e4ba44c21a94e306485f0ec85dff10a96ca8fb479ed5e4d6c0869ea6b9347c8a
                                    • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                    • Opcode Fuzzy Hash: e4ba44c21a94e306485f0ec85dff10a96ca8fb479ed5e4d6c0869ea6b9347c8a
                                    • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                    APIs
                                    • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: AppData$\Opera Software\Opera Stable\
                                    • API String ID: 1174141254-1629609700
                                    • Opcode ID: 6250450be357bdb7cfdd9500bb5b025a57ddc04cf896e3e0a0b797cd2566c5f8
                                    • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                    • Opcode Fuzzy Hash: 6250450be357bdb7cfdd9500bb5b025a57ddc04cf896e3e0a0b797cd2566c5f8
                                    • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID: $G
                                    • API String ID: 269201875-4251033865
                                    • Opcode ID: c3cbfa58486471b9b0b5450975d814376b4bfcef5d9edc52bbd6be3dc13577df
                                    • Instruction ID: 5d396c1abc39b18bdc3e623667384c8b5cce6391ee106473ff554fc58991571d
                                    • Opcode Fuzzy Hash: c3cbfa58486471b9b0b5450975d814376b4bfcef5d9edc52bbd6be3dc13577df
                                    • Instruction Fuzzy Hash: 7CE0E532A0652041F675763B2D05A5B47C55FC2B3AF22033BF028861C1DFEC494A606E
                                    APIs
                                    • GetKeyState.USER32(00000011), ref: 0040B686
                                      • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                      • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                      • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                      • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                      • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                      • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                      • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                      • Part of subcall function 0040A671: SetEvent.KERNEL32(00000000,?,00000000,0040B245,00000000), ref: 0040A69D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                    • String ID: [AltL]$[AltR]
                                    • API String ID: 2738857842-2658077756
                                    • Opcode ID: fa93664948dcb0f020004388e922df39f0c15565708f89507acb73c0046c3751
                                    • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                    • Opcode Fuzzy Hash: fa93664948dcb0f020004388e922df39f0c15565708f89507acb73c0046c3751
                                    • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                    APIs
                                    • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AB37), ref: 00448A16
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Time$FileSystem
                                    • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                                    • API String ID: 2086374402-949981407
                                    • Opcode ID: 36094b6d006a7c5976d2fe62b58f2756bffc72267d66b89a94896d775de98ed0
                                    • Instruction ID: bacba389ed7ed90706db716b221aab5ed2509560655679cc0f09f15d90276a03
                                    • Opcode Fuzzy Hash: 36094b6d006a7c5976d2fe62b58f2756bffc72267d66b89a94896d775de98ed0
                                    • Instruction Fuzzy Hash: 79E0E531A81618FBD7116B25EC02E7EBB50DB08B02B10027FFC05A7292EE754D14D6DE
                                    APIs
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID: !D@$open
                                    • API String ID: 587946157-1586967515
                                    • Opcode ID: 123f3005351d9319ab9640cf94be40b0b125891abe94fb4f7f64a0320ee6aa85
                                    • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                    • Opcode Fuzzy Hash: 123f3005351d9319ab9640cf94be40b0b125891abe94fb4f7f64a0320ee6aa85
                                    • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                    APIs
                                    • ___initconout.LIBCMT ref: 004555DB
                                      • Part of subcall function 00456B9D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004555E0,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000), ref: 00456BB0
                                    • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB99,?), ref: 004555FE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConsoleCreateFileWrite___initconout
                                    • String ID: PkGNG
                                    • API String ID: 3087715906-263838557
                                    • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                    • Instruction ID: 53f4b2898eb153bde3bf118a85e4039abf363423ff24ad7888d91dc13aa78fd6
                                    • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                    • Instruction Fuzzy Hash: C5E0EDB0100548BBDA208B69DC29EBA3328EB00331F500369FE29C62D2EB34EC44C769
                                    APIs
                                    • GetKeyState.USER32(00000012), ref: 0040B6E0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State
                                    • String ID: [CtrlL]$[CtrlR]
                                    • API String ID: 1649606143-2446555240
                                    • Opcode ID: 533432bc897d172b5aee8caafc533d6d1d6dab6a7602291f4f1d8f3613ae2efb
                                    • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                    • Opcode Fuzzy Hash: 533432bc897d172b5aee8caafc533d6d1d6dab6a7602291f4f1d8f3613ae2efb
                                    • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                    APIs
                                      • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                    • __Init_thread_footer.LIBCMT ref: 00410F64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Init_thread_footer__onexit
                                    • String ID: ,kG$0kG
                                    • API String ID: 1881088180-2015055088
                                    • Opcode ID: 159be02b0246ebeb2c04e0d52e857dcc82740e44e8b6cb15f475d12a07aa0db8
                                    • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                    • Opcode Fuzzy Hash: 159be02b0246ebeb2c04e0d52e857dcc82740e44e8b6cb15f475d12a07aa0db8
                                    • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                    APIs
                                    • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D509,00000000,?,00000000), ref: 00413A6C
                                    • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A80
                                    Strings
                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteOpenValue
                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                    • API String ID: 2654517830-1051519024
                                    • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                    • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                    • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                    • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                    APIs
                                    • DeleteFileW.KERNEL32(00000000,?,?,0040ACEE,0000005C,?,?,?,00000000), ref: 0040B8B1
                                    • RemoveDirectoryW.KERNEL32(00000000,?,?,0040ACEE,0000005C,?,?,?,00000000), ref: 0040B8DC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteDirectoryFileRemove
                                    • String ID: xdF
                                    • API String ID: 3325800564-999140092
                                    • Opcode ID: 44949101e04cc8e71f0ce6f1645624d8809e8bbe998220da413487c1cb7b025a
                                    • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                    • Opcode Fuzzy Hash: 44949101e04cc8e71f0ce6f1645624d8809e8bbe998220da413487c1cb7b025a
                                    • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CommandLine
                                    • String ID: `&b
                                    • API String ID: 3253501508-3623129442
                                    • Opcode ID: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                    • Instruction ID: 694146ce0b361bd31d1980ce40e18c0a636997d79f12e70286e675221abc8fda
                                    • Opcode Fuzzy Hash: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                    • Instruction Fuzzy Hash: CBB04878800753CB97108F21AA0C0853FA0B30820238020B6940A92A21EB7885868A08
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                    • GetLastError.KERNEL32 ref: 00440D85
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$ErrorLast
                                    • String ID:
                                    • API String ID: 1717984340-0
                                    • Opcode ID: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                                    • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                    • Opcode Fuzzy Hash: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                                    • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                    APIs
                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                    • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411CB5
                                    • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2069158688.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2069142855.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069193883.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069293703.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2069325222.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_m4VuyJtPKi.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastRead
                                    • String ID:
                                    • API String ID: 4100373531-0
                                    • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                    • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                    • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                    • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                                    Execution Graph

                                    Execution Coverage:3.6%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:0%
                                    Total number of Nodes:1187
                                    Total number of Limit Nodes:36
                                    execution_graph 47313 366cdc 47318 366d59 send 47313->47318 47319 35e04e 47320 35e063 ctype ___scrt_fastfail 47319->47320 47321 35e266 47320->47321 47338 372f55 21 API calls new 47320->47338 47325 35e21a 47321->47325 47333 35dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 47321->47333 47324 35e277 47324->47325 47334 372f55 21 API calls new 47324->47334 47327 35e213 ___scrt_fastfail 47327->47325 47339 372f55 21 API calls new 47327->47339 47329 35e2b0 ___scrt_fastfail 47329->47325 47335 3735db 47329->47335 47331 35e240 ___scrt_fastfail 47331->47325 47340 372f55 21 API calls new 47331->47340 47333->47324 47334->47329 47341 3734fa 47335->47341 47337 3735e3 47337->47325 47338->47327 47339->47331 47340->47321 47342 373513 47341->47342 47346 373509 47341->47346 47342->47346 47347 372f55 21 API calls new 47342->47347 47344 373534 47344->47346 47348 3738c8 CryptAcquireContextA 47344->47348 47346->47337 47347->47344 47349 3738e4 47348->47349 47350 3738e9 CryptGenRandom 47348->47350 47349->47346 47350->47349 47351 3738fe CryptReleaseContext 47350->47351 47351->47349 47352 374918 47353 374924 ___scrt_is_nonwritable_in_current_image 47352->47353 47379 374627 47353->47379 47355 37492b 47357 374954 47355->47357 47677 374a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47355->47677 47363 374993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47357->47363 47678 3842d2 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 47357->47678 47359 37496d 47360 374973 ___scrt_is_nonwritable_in_current_image 47359->47360 47679 384276 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 47359->47679 47362 3749f3 47390 374ba5 47362->47390 47363->47362 47680 383487 35 API calls 3 library calls 47363->47680 47372 374a15 47373 374a1f 47372->47373 47682 3834bf 28 API calls _abort 47372->47682 47375 374a28 47373->47375 47683 383462 28 API calls _abort 47373->47683 47684 37479e 13 API calls 2 library calls 47375->47684 47378 374a30 47378->47360 47380 374630 47379->47380 47685 374cb6 IsProcessorFeaturePresent 47380->47685 47382 37463c 47686 378fb1 10 API calls 4 library calls 47382->47686 47384 374641 47385 374645 47384->47385 47687 38415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47384->47687 47385->47355 47387 37464e 47388 37465c 47387->47388 47688 378fda 8 API calls 3 library calls 47387->47688 47388->47355 47689 376f10 47390->47689 47392 374bb8 GetStartupInfoW 47393 3749f9 47392->47393 47394 384223 47393->47394 47691 38f0d9 47394->47691 47396 374a02 47399 34ea00 47396->47399 47398 38422c 47398->47396 47695 386895 35 API calls 47398->47695 47697 35cbe1 LoadLibraryA GetProcAddress 47399->47697 47401 34ea1c GetModuleFileNameW 47702 34f3fe 47401->47702 47403 34ea38 47717 3420f6 47403->47717 47406 3420f6 28 API calls 47407 34ea56 47406->47407 47723 35beac 47407->47723 47411 34ea68 47749 341e8d 47411->47749 47413 34ea71 47414 34ea84 47413->47414 47415 34eace 47413->47415 48086 34fbee 116 API calls 47414->48086 47755 341e65 47415->47755 47418 34eade 47422 341e65 28 API calls 47418->47422 47419 34ea96 47420 341e65 28 API calls 47419->47420 47421 34eaa2 47420->47421 48087 350f72 36 API calls __EH_prolog 47421->48087 47423 34eafd 47422->47423 47760 34531e 47423->47760 47426 34eab4 48088 34fb9f 77 API calls 47426->48088 47427 34eb0c 47765 346383 47427->47765 47431 34eabd 48089 34f3eb 70 API calls 47431->48089 47437 341fd8 11 API calls 47439 34ef36 47437->47439 47438 341fd8 11 API calls 47440 34eb36 47438->47440 47681 383396 GetModuleHandleW 47439->47681 47441 341e65 28 API calls 47440->47441 47442 34eb3f 47441->47442 47782 341fc0 47442->47782 47444 34eb4a 47445 341e65 28 API calls 47444->47445 47446 34eb63 47445->47446 47447 341e65 28 API calls 47446->47447 47448 34eb7e 47447->47448 47449 34ebe9 47448->47449 48090 346c59 47448->48090 47450 341e65 28 API calls 47449->47450 47455 34ebf6 47450->47455 47452 34ebab 47453 341fe2 28 API calls 47452->47453 47454 34ebb7 47453->47454 47457 341fd8 11 API calls 47454->47457 47456 34ec3d 47455->47456 47786 353584 RegOpenKeyExA 47455->47786 47808 34d0a4 47456->47808 47459 34ebc0 47457->47459 47463 353584 3 API calls 47459->47463 47460 34ec43 47461 34eac6 47460->47461 47811 35b354 47460->47811 47461->47437 47464 34ebdf 47463->47464 47464->47449 47466 34f38a 47464->47466 47471 3539e4 30 API calls 47466->47471 47467 34ec5e 47469 34ecb1 47467->47469 48095 347751 RegOpenKeyExA RegQueryValueExA RegCloseKey 47467->48095 47468 34ec21 47468->47456 47789 3539e4 47468->47789 47473 341e65 28 API calls 47469->47473 47476 34f3a0 47471->47476 47475 34ecba 47473->47475 47474 34ec79 47477 34ec87 47474->47477 47478 34ec7d 47474->47478 47484 34ecc6 47475->47484 47485 34eccb 47475->47485 48116 3524b0 65 API calls ___scrt_fastfail 47476->48116 47481 341e65 28 API calls 47477->47481 48096 347773 30 API calls 47478->48096 47493 34ec90 47481->47493 47482 34f3aa 47486 35bcef 28 API calls 47482->47486 47483 34ec82 48097 34729b 97 API calls 47483->48097 48099 347790 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47484->48099 47489 341e65 28 API calls 47485->47489 47490 34f3ba 47486->47490 47491 34ecd4 47489->47491 47979 353a5e RegOpenKeyExW 47490->47979 47828 35bcef 47491->47828 47493->47469 47497 34ecac 47493->47497 47494 34ecdf 47832 341f13 47494->47832 48098 34729b 97 API calls 47497->48098 47501 341f09 11 API calls 47503 34f3d7 47501->47503 47504 341f09 11 API calls 47503->47504 47506 34f3e0 47504->47506 47982 34dd7d 47506->47982 47507 341e65 28 API calls 47509 34ecfc 47507->47509 47512 341e65 28 API calls 47509->47512 47514 34ed16 47512->47514 47513 34f3ea 47515 341e65 28 API calls 47514->47515 47516 34ed30 47515->47516 47517 341e65 28 API calls 47516->47517 47518 34ed49 47517->47518 47519 34edb6 47518->47519 47521 341e65 28 API calls 47518->47521 47520 34edc5 47519->47520 47527 34ef41 ___scrt_fastfail 47519->47527 47522 34edce 47520->47522 47550 34ee4a ___scrt_fastfail 47520->47550 47525 34ed5e _wcslen 47521->47525 47523 341e65 28 API calls 47522->47523 47524 34edd7 47523->47524 47526 341e65 28 API calls 47524->47526 47525->47519 47528 341e65 28 API calls 47525->47528 47529 34ede9 47526->47529 48103 353733 RegOpenKeyExA 47527->48103 47530 34ed79 47528->47530 47532 341e65 28 API calls 47529->47532 47534 341e65 28 API calls 47530->47534 47533 34edfb 47532->47533 47537 341e65 28 API calls 47533->47537 47535 34ed8e 47534->47535 47844 34da6f 47535->47844 47536 34ef8c 47538 341e65 28 API calls 47536->47538 47539 34ee24 47537->47539 47540 34efb1 47538->47540 47545 341e65 28 API calls 47539->47545 47902 342093 47540->47902 47543 341f13 28 API calls 47544 34edad 47543->47544 47547 341f09 11 API calls 47544->47547 47548 34ee35 47545->47548 47547->47519 48100 34ce34 45 API calls _wcslen 47548->48100 47549 34efc3 47908 3537aa RegCreateKeyA 47549->47908 48101 353982 31 API calls 47550->48101 47555 34eede ctype 47559 341e65 28 API calls 47555->47559 47556 34ee45 47556->47550 47557 341e65 28 API calls 47558 34efe5 47557->47558 47914 37bb2c 47558->47914 47560 34eef5 47559->47560 47560->47536 47564 34ef09 47560->47564 47563 34effc 48106 35ce2c 86 API calls ___scrt_fastfail 47563->48106 47566 341e65 28 API calls 47564->47566 47565 34f01f 47571 342093 28 API calls 47565->47571 47568 34ef12 47566->47568 47569 35bcef 28 API calls 47568->47569 47573 34ef1e 47569->47573 47570 34f003 CreateThread 47570->47565 48861 35d4ee 10 API calls 47570->48861 47572 34f034 47571->47572 47574 342093 28 API calls 47572->47574 48102 34f4af 103 API calls 47573->48102 47576 34f043 47574->47576 47918 35b580 47576->47918 47577 34ef23 47577->47536 47579 34ef2a 47577->47579 47579->47461 47581 341e65 28 API calls 47582 34f054 47581->47582 47583 341e65 28 API calls 47582->47583 47584 34f066 47583->47584 47585 341e65 28 API calls 47584->47585 47586 34f086 47585->47586 47587 37bb2c _strftime 39 API calls 47586->47587 47588 34f093 47587->47588 47589 341e65 28 API calls 47588->47589 47590 34f09e 47589->47590 47591 341e65 28 API calls 47590->47591 47592 34f0af 47591->47592 47593 341e65 28 API calls 47592->47593 47594 34f0c4 47593->47594 47595 341e65 28 API calls 47594->47595 47596 34f0d5 47595->47596 47597 34f0dc StrToIntA 47596->47597 47942 349e1f 47597->47942 47600 341e65 28 API calls 47601 34f0f7 47600->47601 47602 34f103 47601->47602 47603 34f13c 47601->47603 48107 37455e 22 API calls 2 library calls 47602->48107 47605 341e65 28 API calls 47603->47605 47607 34f14c 47605->47607 47606 34f10c 47608 341e65 28 API calls 47606->47608 47610 34f194 47607->47610 47611 34f158 47607->47611 47609 34f11f 47608->47609 47612 34f126 CreateThread 47609->47612 47614 341e65 28 API calls 47610->47614 48108 37455e 22 API calls 2 library calls 47611->48108 47612->47603 48864 35a045 102 API calls 2 library calls 47612->48864 47616 34f19d 47614->47616 47615 34f161 47617 341e65 28 API calls 47615->47617 47619 34f207 47616->47619 47620 34f1a9 47616->47620 47618 34f173 47617->47618 47623 34f17a CreateThread 47618->47623 47621 341e65 28 API calls 47619->47621 47622 341e65 28 API calls 47620->47622 47624 34f210 47621->47624 47625 34f1b9 47622->47625 47623->47610 48863 35a045 102 API calls 2 library calls 47623->48863 47626 34f255 47624->47626 47627 34f21c 47624->47627 47628 341e65 28 API calls 47625->47628 47967 35b69e 47626->47967 47630 341e65 28 API calls 47627->47630 47631 34f1ce 47628->47631 47633 34f225 47630->47633 48109 34da23 31 API calls 47631->48109 47638 341e65 28 API calls 47633->47638 47634 341f13 28 API calls 47635 34f269 47634->47635 47637 341f09 11 API calls 47635->47637 47640 34f272 47637->47640 47641 34f23a 47638->47641 47639 34f1e1 47642 341f13 28 API calls 47639->47642 47643 34f27e CreateThread 47640->47643 47644 34f27b SetProcessDEPPolicy 47640->47644 47652 37bb2c _strftime 39 API calls 47641->47652 47645 34f1ed 47642->47645 47646 34f293 CreateThread 47643->47646 47647 34f29f 47643->47647 48833 34f7e2 47643->48833 47644->47643 47648 341f09 11 API calls 47645->47648 47646->47647 48865 352132 137 API calls 47646->48865 47650 34f2b4 47647->47650 47651 34f2a8 CreateThread 47647->47651 47649 34f1f6 CreateThread 47648->47649 47649->47619 48860 341be9 49 API calls _strftime 47649->48860 47654 34f307 47650->47654 47656 342093 28 API calls 47650->47656 47651->47650 48862 352716 38 API calls ___scrt_fastfail 47651->48862 47653 34f247 47652->47653 48110 34c19d 7 API calls 47653->48110 48112 35353a RegOpenKeyExA 47654->48112 47657 34f2d7 47656->47657 48111 3452fd 28 API calls 47657->48111 47662 34f328 47664 35bcef 28 API calls 47662->47664 47666 34f338 47664->47666 48115 353656 31 API calls 47666->48115 47671 34f34e 47672 341f09 11 API calls 47671->47672 47675 34f359 47672->47675 47673 34f381 DeleteFileW 47674 34f388 47673->47674 47673->47675 47674->47482 47675->47482 47675->47673 47676 34f36f Sleep 47675->47676 47676->47675 47677->47355 47678->47359 47679->47363 47680->47362 47681->47372 47682->47373 47683->47375 47684->47378 47685->47382 47686->47384 47687->47387 47688->47385 47690 376f27 47689->47690 47690->47392 47690->47690 47692 38f0e2 47691->47692 47694 38f0eb 47691->47694 47696 38efd8 48 API calls 4 library calls 47692->47696 47694->47398 47695->47398 47696->47694 47698 35cc20 LoadLibraryA GetProcAddress 47697->47698 47699 35cc10 GetModuleHandleA GetProcAddress 47697->47699 47700 35cc49 44 API calls 47698->47700 47701 35cc39 LoadLibraryA GetProcAddress 47698->47701 47699->47698 47700->47401 47701->47700 48117 35b539 FindResourceA 47702->48117 47706 34f428 ctype 48129 3420b7 47706->48129 47709 341fe2 28 API calls 47710 34f44e 47709->47710 47711 341fd8 11 API calls 47710->47711 47712 34f457 47711->47712 47713 37bda0 new 21 API calls 47712->47713 47714 34f468 ctype 47713->47714 48135 346e13 47714->48135 47716 34f49b 47716->47403 47718 34210c 47717->47718 47719 3423ce 11 API calls 47718->47719 47720 342126 47719->47720 47721 342569 28 API calls 47720->47721 47722 342134 47721->47722 47722->47406 48172 3420df 47723->48172 47725 341fd8 11 API calls 47726 35bf61 47725->47726 47727 341fd8 11 API calls 47726->47727 47729 35bf69 47727->47729 47728 35bf31 47730 3441a2 28 API calls 47728->47730 47732 341fd8 11 API calls 47729->47732 47733 35bf3d 47730->47733 47734 34ea5f 47732->47734 47735 341fe2 28 API calls 47733->47735 47745 34fb52 47734->47745 47737 35bf46 47735->47737 47736 341fe2 28 API calls 47743 35bebf 47736->47743 47739 341fd8 11 API calls 47737->47739 47738 341fd8 11 API calls 47738->47743 47740 35bf4e 47739->47740 48180 35cec5 28 API calls 47740->48180 47743->47728 47743->47736 47743->47738 47744 35bf2f 47743->47744 48176 3441a2 47743->48176 48179 35cec5 28 API calls 47743->48179 47744->47725 47746 34fb5e 47745->47746 47748 34fb65 47745->47748 48187 342163 11 API calls 47746->48187 47748->47411 47750 342163 47749->47750 47754 34219f 47750->47754 48188 342730 11 API calls 47750->48188 47752 342184 48189 342712 11 API calls std::_Deallocate 47752->48189 47754->47413 47756 341e6d 47755->47756 47757 341e75 47756->47757 48190 342158 28 API calls 47756->48190 47757->47418 47759 341e8c 47761 3420df 11 API calls 47760->47761 47762 34532a 47761->47762 48191 3432a0 47762->48191 47764 345346 47764->47427 48196 3451ef 47765->48196 47767 346391 48200 342055 47767->48200 47770 341fe2 47771 341ff1 47770->47771 47778 342039 47770->47778 47772 3423ce 11 API calls 47771->47772 47773 341ffa 47772->47773 47774 34203c 47773->47774 47775 342015 47773->47775 47776 34267a 11 API calls 47774->47776 48215 343098 28 API calls 47775->48215 47776->47778 47779 341fd8 47778->47779 47780 3423ce 11 API calls 47779->47780 47781 341fe1 47780->47781 47781->47438 47783 341fd2 47782->47783 47784 341fc9 47782->47784 47783->47444 48216 3425e0 28 API calls 47784->48216 47787 3535ae RegQueryValueExA RegCloseKey 47786->47787 47788 3535db 47786->47788 47787->47788 47788->47468 47790 342093 28 API calls 47789->47790 47791 3539f9 47790->47791 47792 342093 28 API calls 47791->47792 47793 353a02 47792->47793 47794 35bcef 28 API calls 47793->47794 47795 353a0d 47794->47795 47796 35bcef 28 API calls 47795->47796 47797 353a20 47796->47797 47798 353a5e 2 API calls 47797->47798 47799 353a33 47798->47799 47800 341f09 11 API calls 47799->47800 47801 353a3e 47800->47801 47802 341f09 11 API calls 47801->47802 47803 353a46 47802->47803 47804 341fd8 11 API calls 47803->47804 47805 353a4e 47804->47805 47806 341fd8 11 API calls 47805->47806 47807 353a56 47806->47807 47807->47456 48217 341fab 47808->48217 47810 34d0ae CreateMutexA GetLastError 47810->47460 48218 35c048 47811->48218 47816 341fe2 28 API calls 47817 35b390 47816->47817 47818 341fd8 11 API calls 47817->47818 47819 35b398 47818->47819 47820 3535e1 31 API calls 47819->47820 47822 35b3ee 47819->47822 47821 35b3c1 47820->47821 47823 35b3cc StrToIntA 47821->47823 47822->47467 47824 35b3e3 47823->47824 47825 35b3da 47823->47825 47827 341fd8 11 API calls 47824->47827 48226 35cffa 22 API calls 47825->48226 47827->47822 47829 35bd03 47828->47829 48227 34b93f 47829->48227 47831 35bd0b 47831->47494 47833 341f22 47832->47833 47840 341f6a 47832->47840 47834 342252 11 API calls 47833->47834 47835 341f2b 47834->47835 47836 341f6d 47835->47836 47837 341f46 47835->47837 48260 342336 47836->48260 48259 34305c 28 API calls 47837->48259 47841 341f09 47840->47841 47842 342252 11 API calls 47841->47842 47843 341f12 47842->47843 47843->47507 48264 341f86 47844->48264 47847 34dae0 47852 35c048 GetCurrentProcess 47847->47852 47848 34daab 48274 35b645 29 API calls 47848->48274 47849 34daa1 47851 34dbd4 GetLongPathNameW 47849->47851 48268 34417e 47851->48268 47855 34dae5 47852->47855 47853 34dab4 47856 341f13 28 API calls 47853->47856 47858 34dae9 47855->47858 47859 34db3b 47855->47859 47860 34dabe 47856->47860 47863 34417e 28 API calls 47858->47863 47862 34417e 28 API calls 47859->47862 47867 341f09 11 API calls 47860->47867 47861 34417e 28 API calls 47864 34dbf8 47861->47864 47865 34db49 47862->47865 47866 34daf7 47863->47866 48277 34de0c 28 API calls 47864->48277 47870 34417e 28 API calls 47865->47870 47871 34417e 28 API calls 47866->47871 47867->47849 47869 34dc0b 48278 342fa5 28 API calls 47869->48278 47874 34db5f 47870->47874 47875 34db0d 47871->47875 47873 34dc16 48279 342fa5 28 API calls 47873->48279 48276 342fa5 28 API calls 47874->48276 48275 342fa5 28 API calls 47875->48275 47879 34dc20 47882 341f09 11 API calls 47879->47882 47880 34db6a 47883 341f13 28 API calls 47880->47883 47881 34db18 47884 341f13 28 API calls 47881->47884 47885 34dc2a 47882->47885 47886 34db75 47883->47886 47887 34db23 47884->47887 47888 341f09 11 API calls 47885->47888 47889 341f09 11 API calls 47886->47889 47890 341f09 11 API calls 47887->47890 47891 34dc33 47888->47891 47892 34db7e 47889->47892 47893 34db2c 47890->47893 47894 341f09 11 API calls 47891->47894 47895 341f09 11 API calls 47892->47895 47896 341f09 11 API calls 47893->47896 47897 34dc3c 47894->47897 47895->47860 47896->47860 47898 341f09 11 API calls 47897->47898 47899 34dc45 47898->47899 47900 341f09 11 API calls 47899->47900 47901 34dc4e 47900->47901 47901->47543 47903 34209b 47902->47903 47904 3423ce 11 API calls 47903->47904 47905 3420a6 47904->47905 48303 3424ed 47905->48303 47909 3537fa 47908->47909 47911 3537c3 47908->47911 47910 341fd8 11 API calls 47909->47910 47912 34efd9 47910->47912 47913 3537d5 RegSetValueExA RegCloseKey 47911->47913 47912->47557 47913->47909 47915 37bb45 _strftime 47914->47915 48307 37ae83 47915->48307 47917 34eff2 47917->47563 47917->47565 47919 35b596 GetLocalTime 47918->47919 47920 35b631 47918->47920 47921 34531e 28 API calls 47919->47921 47922 341fd8 11 API calls 47920->47922 47923 35b5d8 47921->47923 47924 35b639 47922->47924 47926 346383 28 API calls 47923->47926 47925 341fd8 11 API calls 47924->47925 47927 34f048 47925->47927 47928 35b5e4 47926->47928 47927->47581 48335 342f10 47928->48335 47931 346383 28 API calls 47932 35b5fc 47931->47932 48340 34723b 76 API calls 47932->48340 47934 35b60a 47935 341fd8 11 API calls 47934->47935 47936 35b616 47935->47936 47937 341fd8 11 API calls 47936->47937 47938 35b61f 47937->47938 47939 341fd8 11 API calls 47938->47939 47940 35b628 47939->47940 47941 341fd8 11 API calls 47940->47941 47941->47920 47943 349e3d _wcslen 47942->47943 47944 349e5f 47943->47944 47945 349e48 47943->47945 47947 34da6f 31 API calls 47944->47947 47946 34da6f 31 API calls 47945->47946 47949 349e50 47946->47949 47948 349e67 47947->47948 47950 341f13 28 API calls 47948->47950 47951 341f13 28 API calls 47949->47951 47952 349e75 47950->47952 47953 349e5a 47951->47953 47954 341f09 11 API calls 47952->47954 47956 341f09 11 API calls 47953->47956 47955 349e7d 47954->47955 48370 349196 28 API calls 47955->48370 47958 349eb4 47956->47958 48355 34a144 47958->48355 47960 349e8f 48371 343014 47960->48371 47964 341f13 28 API calls 47965 349ea4 47964->47965 47966 341f09 11 API calls 47965->47966 47966->47953 47968 35b6c1 GetUserNameW 47967->47968 47969 34417e 28 API calls 47968->47969 47970 35b6ed 47969->47970 48411 3442fc 47970->48411 47973 343014 28 API calls 47974 35b703 47973->47974 47975 341f09 11 API calls 47974->47975 47976 35b70c 47975->47976 47977 341f09 11 API calls 47976->47977 47978 34f25e 47977->47978 47978->47634 47980 353a7a RegDeleteValueW 47979->47980 47981 34f3cd 47979->47981 47980->47981 47981->47501 47983 34dd96 47982->47983 47984 35353a 3 API calls 47983->47984 47985 34dd9d 47984->47985 47989 34ddbc 47985->47989 48488 341707 47985->48488 47987 34ddaa 48491 3538b2 RegCreateKeyA 47987->48491 47990 354f65 47989->47990 47991 3420df 11 API calls 47990->47991 47992 354f79 47991->47992 48505 35b944 47992->48505 47995 3420df 11 API calls 47996 354f8f 47995->47996 47997 341e65 28 API calls 47996->47997 47998 354f9d 47997->47998 47999 37bb2c _strftime 39 API calls 47998->47999 48000 354faa 47999->48000 48001 354fbc 48000->48001 48002 354faf Sleep 48000->48002 48003 342093 28 API calls 48001->48003 48002->48001 48004 354fcb 48003->48004 48005 341e65 28 API calls 48004->48005 48006 354fd4 48005->48006 48007 3420f6 28 API calls 48006->48007 48008 354fdf 48007->48008 48009 35beac 28 API calls 48008->48009 48010 354fe7 48009->48010 48509 34489e WSAStartup 48010->48509 48012 354ff1 48013 341e65 28 API calls 48012->48013 48014 354ffa 48013->48014 48015 341e65 28 API calls 48014->48015 48041 355079 48014->48041 48016 355013 48015->48016 48019 341e65 28 API calls 48016->48019 48017 341e65 28 API calls 48017->48041 48018 3420f6 28 API calls 48018->48041 48020 355024 48019->48020 48022 341e65 28 API calls 48020->48022 48021 35beac 28 API calls 48021->48041 48023 355035 48022->48023 48025 341e65 28 API calls 48023->48025 48024 346c59 28 API calls 48024->48041 48026 355046 48025->48026 48027 341e65 28 API calls 48026->48027 48029 355057 48027->48029 48028 341fe2 28 API calls 48028->48041 48031 341e65 28 API calls 48029->48031 48030 341fd8 11 API calls 48030->48041 48032 355069 48031->48032 48667 34473d 88 API calls 48032->48667 48034 346383 28 API calls 48034->48041 48036 3551c7 WSAGetLastError 48668 35cb72 30 API calls 48036->48668 48041->48017 48041->48018 48041->48021 48041->48024 48041->48028 48041->48030 48041->48034 48041->48036 48043 35b580 79 API calls 48041->48043 48045 34531e 28 API calls 48041->48045 48046 341e8d 11 API calls 48041->48046 48047 37bb2c _strftime 39 API calls 48041->48047 48049 342f10 28 API calls 48041->48049 48050 342093 28 API calls 48041->48050 48053 349097 28 API calls 48041->48053 48055 353733 3 API calls 48041->48055 48056 3535e1 31 API calls 48041->48056 48057 34417e 28 API calls 48041->48057 48062 341e65 28 API calls 48041->48062 48510 354f24 48041->48510 48516 34482d 48041->48516 48523 344f51 48041->48523 48538 3448c8 connect 48041->48538 48598 35b871 48041->48598 48601 3545f8 48041->48601 48604 381ed1 48041->48604 48608 34ddc4 48041->48608 48614 35bcd3 48041->48614 48617 35bdaf 48041->48617 48621 35bc1f 48041->48621 48654 344e26 WaitForSingleObject 48041->48654 48669 3452fd 28 API calls 48041->48669 48043->48041 48045->48041 48046->48041 48048 355b0a Sleep 48047->48048 48048->48041 48049->48041 48050->48041 48053->48041 48055->48041 48056->48041 48057->48041 48063 355474 GetTickCount 48062->48063 48064 35bc1f 28 API calls 48063->48064 48077 355491 48064->48077 48066 35bc1f 28 API calls 48066->48077 48069 35bdaf 28 API calls 48069->48077 48071 346383 28 API calls 48071->48077 48072 342ea1 28 API calls 48072->48077 48073 342f10 28 API calls 48073->48077 48075 341fd8 11 API calls 48075->48077 48076 341f09 11 API calls 48076->48077 48077->48066 48077->48069 48077->48071 48077->48072 48077->48073 48077->48075 48077->48076 48626 35bb77 48077->48626 48628 35bb27 48077->48628 48633 34f90c 29 API calls 48077->48633 48634 342f31 28 API calls 48077->48634 48635 344c10 48077->48635 48670 344aa1 60 API calls ctype 48077->48670 48080 342093 28 API calls 48085 355a4a 48080->48085 48081 35b580 79 API calls 48081->48085 48082 355aac CreateThread 48082->48085 48832 35ada8 104 API calls 48082->48832 48083 341fd8 11 API calls 48083->48085 48084 341f09 11 API calls 48084->48085 48085->48041 48085->48080 48085->48081 48085->48082 48085->48083 48085->48084 48671 34b08c 84 API calls 48085->48671 48086->47419 48087->47426 48088->47431 48091 3420df 11 API calls 48090->48091 48092 346c65 48091->48092 48093 3432a0 28 API calls 48092->48093 48094 346c82 48093->48094 48094->47452 48095->47474 48096->47483 48097->47477 48098->47469 48099->47485 48100->47556 48101->47555 48102->47577 48104 353759 RegQueryValueExA RegCloseKey 48103->48104 48105 35377d 48103->48105 48104->48105 48105->47536 48106->47570 48107->47606 48108->47615 48109->47639 48110->47626 48113 34f31f 48112->48113 48114 35355b RegQueryValueExA RegCloseKey 48112->48114 48113->47506 48113->47662 48114->48113 48115->47671 48118 35b556 LoadResource LockResource SizeofResource 48117->48118 48119 34f419 48117->48119 48118->48119 48120 37bda0 48119->48120 48121 3861b8 48120->48121 48122 3861f6 48121->48122 48124 3861ca ___crtLCMapStringA 48121->48124 48125 3861e1 HeapAlloc 48121->48125 48139 38062d 20 API calls _abort 48122->48139 48124->48122 48124->48125 48138 383001 7 API calls 2 library calls 48124->48138 48125->48124 48127 3861f4 48125->48127 48126 3861fb 48126->47706 48127->48126 48130 3420bf 48129->48130 48140 3423ce 48130->48140 48132 3420ca 48144 34250a 48132->48144 48134 3420d9 48134->47709 48136 3420b7 28 API calls 48135->48136 48137 346e27 48136->48137 48137->47716 48138->48124 48139->48126 48141 342428 48140->48141 48142 3423d8 48140->48142 48141->48132 48142->48141 48151 3427a7 11 API calls std::_Deallocate 48142->48151 48145 34251a 48144->48145 48146 342535 48145->48146 48147 342520 48145->48147 48162 3428e8 28 API calls 48146->48162 48152 342569 48147->48152 48150 342533 48150->48134 48151->48141 48163 342888 48152->48163 48154 34257d 48155 3425a7 48154->48155 48156 342592 48154->48156 48170 3428e8 28 API calls 48155->48170 48168 342a34 22 API calls 48156->48168 48159 34259b 48169 3429da 22 API calls 48159->48169 48161 3425a5 48161->48150 48162->48150 48164 342890 48163->48164 48165 342898 48164->48165 48171 342ca3 22 API calls 48164->48171 48165->48154 48168->48159 48169->48161 48170->48161 48173 3420e7 48172->48173 48174 3423ce 11 API calls 48173->48174 48175 3420f2 48174->48175 48175->47743 48181 34423a 48176->48181 48179->47743 48180->47744 48182 344243 48181->48182 48183 3423ce 11 API calls 48182->48183 48184 34424e 48183->48184 48185 342569 28 API calls 48184->48185 48186 3441b5 48185->48186 48186->47743 48187->47748 48188->47752 48189->47754 48190->47759 48192 3432aa 48191->48192 48194 3432c9 48192->48194 48195 3428e8 28 API calls 48192->48195 48194->47764 48195->48194 48197 3451fb 48196->48197 48206 345274 48197->48206 48199 345208 48199->47767 48201 342061 48200->48201 48202 3423ce 11 API calls 48201->48202 48203 34207b 48202->48203 48211 34267a 48203->48211 48207 345282 48206->48207 48210 3428a4 22 API calls 48207->48210 48212 34268b 48211->48212 48213 3423ce 11 API calls 48212->48213 48214 34208d 48213->48214 48214->47770 48215->47778 48216->47783 48219 35c055 GetCurrentProcess 48218->48219 48220 35b362 48218->48220 48219->48220 48221 3535e1 RegOpenKeyExA 48220->48221 48222 35360f RegQueryValueExA RegCloseKey 48221->48222 48223 353639 48221->48223 48222->48223 48224 342093 28 API calls 48223->48224 48225 35364e 48224->48225 48225->47816 48226->47824 48228 34b947 48227->48228 48233 342252 48228->48233 48230 34b952 48237 34b967 48230->48237 48232 34b961 48232->47831 48234 3422ac 48233->48234 48235 34225c 48233->48235 48234->48230 48235->48234 48244 342779 11 API calls std::_Deallocate 48235->48244 48238 34b9a1 48237->48238 48239 34b973 48237->48239 48256 3428a4 22 API calls 48238->48256 48245 3427e6 48239->48245 48243 34b97d 48243->48232 48244->48234 48246 3427ef 48245->48246 48247 342851 48246->48247 48248 3427f9 48246->48248 48258 3428a4 22 API calls 48247->48258 48251 342802 48248->48251 48253 342815 48248->48253 48257 342aea 28 API calls __EH_prolog 48251->48257 48254 342813 48253->48254 48255 342252 11 API calls 48253->48255 48254->48243 48255->48254 48257->48254 48259->47840 48261 342347 48260->48261 48262 342252 11 API calls 48261->48262 48263 3423c7 48262->48263 48263->47840 48265 341f8e 48264->48265 48266 342252 11 API calls 48265->48266 48267 341f99 48266->48267 48267->47847 48267->47848 48267->47849 48269 344186 48268->48269 48270 342252 11 API calls 48269->48270 48271 344191 48270->48271 48280 3441bc 48271->48280 48274->47853 48275->47881 48276->47880 48277->47869 48278->47873 48279->47879 48281 3441c8 48280->48281 48284 3441d9 48281->48284 48283 34419c 48283->47861 48285 3441e9 48284->48285 48286 344206 48285->48286 48288 3441ef 48285->48288 48287 3427e6 28 API calls 48286->48287 48290 344204 48287->48290 48291 344267 48288->48291 48290->48283 48292 342888 22 API calls 48291->48292 48293 34427b 48292->48293 48294 3442a5 48293->48294 48295 344290 48293->48295 48297 3427e6 28 API calls 48294->48297 48301 3442df 22 API calls 48295->48301 48300 3442a3 48297->48300 48298 344299 48302 342c48 22 API calls 48298->48302 48300->48290 48301->48298 48302->48300 48304 3424f9 48303->48304 48305 34250a 28 API calls 48304->48305 48306 3420b1 48305->48306 48306->47549 48323 37ba8a 48307->48323 48309 37aed0 48329 37a837 35 API calls 3 library calls 48309->48329 48310 37ae95 48310->48309 48311 37aeaa 48310->48311 48314 37aeaf pre_c_initialization 48310->48314 48328 38062d 20 API calls _abort 48311->48328 48314->47917 48316 37aedc 48317 37af0b 48316->48317 48330 37bacf 39 API calls __Toupper 48316->48330 48320 37af77 48317->48320 48331 37ba36 20 API calls 2 library calls 48317->48331 48332 37ba36 20 API calls 2 library calls 48320->48332 48321 37b03e _strftime 48321->48314 48333 38062d 20 API calls _abort 48321->48333 48324 37baa2 48323->48324 48325 37ba8f 48323->48325 48324->48310 48334 38062d 20 API calls _abort 48325->48334 48327 37ba94 pre_c_initialization 48327->48310 48328->48314 48329->48316 48330->48316 48331->48320 48332->48321 48333->48314 48334->48327 48341 341fb0 48335->48341 48337 342f1e 48338 342055 11 API calls 48337->48338 48339 342f2d 48338->48339 48339->47931 48340->47934 48344 3425f0 48341->48344 48343 341fbd 48343->48337 48345 342888 22 API calls 48344->48345 48346 342602 48345->48346 48347 342672 48346->48347 48348 342629 48346->48348 48354 3428a4 22 API calls 48347->48354 48352 34263b 48348->48352 48353 3428e8 28 API calls 48348->48353 48352->48343 48353->48352 48356 34a162 48355->48356 48357 353584 3 API calls 48356->48357 48358 34a169 48357->48358 48359 34a197 48358->48359 48360 34a17d 48358->48360 48361 349097 28 API calls 48359->48361 48362 34a182 48360->48362 48363 349ed6 48360->48363 48365 34a1a5 48361->48365 48376 349097 48362->48376 48363->47600 48383 34a1b4 85 API calls 48365->48383 48369 34a195 48369->48363 48370->47960 48388 343222 48371->48388 48373 343022 48392 343262 48373->48392 48377 3490ad 48376->48377 48378 342252 11 API calls 48377->48378 48379 3490c7 48378->48379 48380 344267 28 API calls 48379->48380 48381 3490d5 48380->48381 48382 34a268 29 API calls 48381->48382 48382->48369 48384 34a2ae 162 API calls 48382->48384 48383->48363 48385 34a2c4 48 API calls 48383->48385 48386 34a2a2 85 API calls 48383->48386 48387 34a2b8 127 API calls 48383->48387 48389 34322e 48388->48389 48398 343618 48389->48398 48391 34323b 48391->48373 48393 34326e 48392->48393 48394 342252 11 API calls 48393->48394 48395 343288 48394->48395 48396 342336 11 API calls 48395->48396 48397 343031 48396->48397 48397->47964 48399 343626 48398->48399 48400 343644 48399->48400 48401 34362c 48399->48401 48402 34365c 48400->48402 48403 34369e 48400->48403 48409 3436a6 28 API calls 48401->48409 48405 343642 48402->48405 48407 3427e6 28 API calls 48402->48407 48410 3428a4 22 API calls 48403->48410 48405->48391 48407->48405 48409->48405 48416 344353 48411->48416 48413 34430a 48414 343262 11 API calls 48413->48414 48415 344319 48414->48415 48415->47973 48417 34435f 48416->48417 48420 344371 48417->48420 48419 34436d 48419->48413 48421 34437f 48420->48421 48422 344385 48421->48422 48423 34439e 48421->48423 48486 3434e6 28 API calls 48422->48486 48424 342888 22 API calls 48423->48424 48425 3443a6 48424->48425 48427 3443bf 48425->48427 48428 344419 48425->48428 48431 3427e6 28 API calls 48427->48431 48436 34439c 48427->48436 48487 3428a4 22 API calls 48428->48487 48431->48436 48436->48419 48486->48436 48494 37ab1a 48488->48494 48492 3538f4 48491->48492 48493 3538ca RegSetValueExA RegCloseKey 48491->48493 48492->47989 48493->48492 48497 37aa9b 48494->48497 48496 34170d 48496->47987 48498 37aabe 48497->48498 48499 37aaaa 48497->48499 48502 37aaaf pre_c_initialization __alldvrm 48498->48502 48504 3889d7 11 API calls 2 library calls 48498->48504 48503 38062d 20 API calls _abort 48499->48503 48502->48496 48503->48502 48504->48502 48508 35b98a ctype ___scrt_fastfail 48505->48508 48506 342093 28 API calls 48507 354f84 48506->48507 48507->47995 48508->48506 48509->48012 48511 354f33 48510->48511 48512 354f3d WSASetLastError 48510->48512 48672 354dc1 29 API calls ___std_exception_copy 48511->48672 48512->48041 48514 354f38 48514->48512 48517 344846 socket 48516->48517 48518 344839 48516->48518 48520 344860 CreateEventW 48517->48520 48521 344842 48517->48521 48673 34489e WSAStartup 48518->48673 48520->48041 48521->48041 48522 34483e 48522->48517 48522->48521 48524 344f65 48523->48524 48525 344fea 48523->48525 48526 344f6e 48524->48526 48527 344fc0 CreateEventA CreateThread 48524->48527 48528 344f7d GetLocalTime 48524->48528 48525->48041 48526->48527 48527->48525 48675 345150 48527->48675 48529 35bc1f 28 API calls 48528->48529 48530 344f91 48529->48530 48674 3452fd 28 API calls 48530->48674 48539 3448ee 48538->48539 48540 344a1b 48538->48540 48541 34497e 48539->48541 48543 344923 48539->48543 48545 34531e 28 API calls 48539->48545 48540->48541 48542 344a21 WSAGetLastError 48540->48542 48541->48041 48542->48541 48544 344a31 48542->48544 48679 360cf1 27 API calls 48543->48679 48546 344a36 48544->48546 48547 344932 48544->48547 48549 34490f 48545->48549 48684 35cb72 30 API calls 48546->48684 48552 342093 28 API calls 48547->48552 48553 342093 28 API calls 48549->48553 48551 34492b 48551->48547 48555 344941 48551->48555 48556 344a80 48552->48556 48557 34491e 48553->48557 48554 344a40 48685 3452fd 28 API calls 48554->48685 48562 344987 48555->48562 48563 344950 48555->48563 48559 342093 28 API calls 48556->48559 48560 35b580 79 API calls 48557->48560 48564 344a8f 48559->48564 48560->48543 48681 361ad1 53 API calls 48562->48681 48566 342093 28 API calls 48563->48566 48567 35b580 79 API calls 48564->48567 48570 34495f 48566->48570 48567->48541 48576 342093 28 API calls 48570->48576 48571 34498f 48573 3449c4 48571->48573 48574 344994 48571->48574 48683 360e97 28 API calls 48573->48683 48577 342093 28 API calls 48574->48577 48579 34496e 48576->48579 48581 3449a3 48577->48581 48582 35b580 79 API calls 48579->48582 48584 342093 28 API calls 48581->48584 48585 344973 48582->48585 48583 3449cc 48586 3449f9 CreateEventW CreateEventW 48583->48586 48588 342093 28 API calls 48583->48588 48587 3449b2 48584->48587 48680 35e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48585->48680 48586->48541 48589 35b580 79 API calls 48587->48589 48591 3449e2 48588->48591 48592 3449b7 48589->48592 48593 342093 28 API calls 48591->48593 48682 361143 51 API calls 48592->48682 48594 3449f1 48593->48594 48596 35b580 79 API calls 48594->48596 48597 3449f6 48596->48597 48597->48586 48686 35b847 GlobalMemoryStatusEx 48598->48686 48600 35b886 48600->48041 48687 3545bb 48601->48687 48605 381edd 48604->48605 48725 381ccd 48605->48725 48607 381efe 48607->48041 48609 34dde0 48608->48609 48610 35353a 3 API calls 48609->48610 48611 34dde7 48610->48611 48612 353584 3 API calls 48611->48612 48613 34ddff 48611->48613 48612->48613 48613->48041 48615 3420b7 28 API calls 48614->48615 48616 35bce8 48615->48616 48616->48041 48618 35bdbc 48617->48618 48619 3420b7 28 API calls 48618->48619 48620 35bdce 48619->48620 48620->48041 48622 381ed1 20 API calls 48621->48622 48623 35bc43 48622->48623 48624 342093 28 API calls 48623->48624 48625 35bc51 48624->48625 48625->48041 48627 35bb8d GetTickCount 48626->48627 48627->48077 48629 376f10 ___scrt_fastfail 48628->48629 48630 35bb46 GetForegroundWindow GetWindowTextW 48629->48630 48631 34417e 28 API calls 48630->48631 48632 35bb70 48631->48632 48632->48077 48633->48077 48634->48077 48636 3420df 11 API calls 48635->48636 48637 344c27 48636->48637 48638 3420df 11 API calls 48637->48638 48642 344c30 48638->48642 48639 37bda0 new 21 API calls 48639->48642 48641 344c96 48641->48642 48644 344ca1 48641->48644 48642->48639 48642->48641 48643 3420b7 28 API calls 48642->48643 48645 341fe2 28 API calls 48642->48645 48648 341fd8 11 API calls 48642->48648 48730 344cc3 48642->48730 48742 344b96 56 API calls 48642->48742 48643->48642 48646 344e26 98 API calls 48644->48646 48645->48642 48647 344ca8 48646->48647 48649 341fd8 11 API calls 48647->48649 48648->48642 48650 344cb1 48649->48650 48651 341fd8 11 API calls 48650->48651 48652 344cba 48651->48652 48652->48085 48655 344e57 closesocket 48654->48655 48656 344e40 SetEvent CloseHandle 48654->48656 48658 344e64 48655->48658 48657 344ed8 48656->48657 48657->48041 48659 344e7a 48658->48659 48829 3450e4 83 API calls 48658->48829 48660 344e8c WaitForSingleObject 48659->48660 48661 344ece SetEvent CloseHandle 48659->48661 48830 35e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48660->48830 48661->48657 48664 344e9b SetEvent WaitForSingleObject 48831 35e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48664->48831 48666 344eb3 SetEvent CloseHandle CloseHandle 48666->48661 48667->48041 48668->48041 48670->48077 48671->48085 48672->48514 48673->48522 48678 34515c 101 API calls 48675->48678 48677 345159 48678->48677 48679->48551 48680->48541 48681->48571 48682->48585 48683->48583 48684->48554 48686->48600 48690 35458e 48687->48690 48691 3545a3 ___scrt_initialize_default_local_stdio_options 48690->48691 48694 37f7ed 48691->48694 48697 37c540 48694->48697 48698 37c580 48697->48698 48699 37c568 48697->48699 48698->48699 48701 37c588 48698->48701 48719 38062d 20 API calls _abort 48699->48719 48720 37a837 35 API calls 3 library calls 48701->48720 48703 37c598 48721 37ccc6 20 API calls 2 library calls 48703->48721 48706 37c610 48722 37d334 50 API calls 3 library calls 48706->48722 48707 3545b1 48707->48041 48710 37c56d pre_c_initialization 48712 37502b 48710->48712 48711 37c61b 48723 37cd30 20 API calls _free 48711->48723 48713 375036 IsProcessorFeaturePresent 48712->48713 48714 375034 48712->48714 48716 375078 48713->48716 48714->48707 48724 37503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48716->48724 48718 37515b 48718->48707 48719->48710 48720->48703 48721->48706 48722->48711 48723->48710 48724->48718 48726 381ce4 48725->48726 48728 381d1b pre_c_initialization 48726->48728 48729 38062d 20 API calls _abort 48726->48729 48728->48607 48729->48728 48731 3420df 11 API calls 48730->48731 48736 344cde 48731->48736 48732 344e13 48733 341fd8 11 API calls 48732->48733 48734 344e1c 48733->48734 48734->48641 48735 3441a2 28 API calls 48735->48736 48736->48732 48736->48735 48737 341fe2 28 API calls 48736->48737 48738 3420f6 28 API calls 48736->48738 48739 341fc0 28 API calls 48736->48739 48741 341fd8 11 API calls 48736->48741 48737->48736 48738->48736 48740 344dad CreateEventA CreateThread WaitForSingleObject CloseHandle 48739->48740 48740->48736 48743 355b25 48740->48743 48741->48736 48742->48642 48744 3420f6 28 API calls 48743->48744 48745 355b47 SetEvent 48744->48745 48746 355b5c 48745->48746 48747 3441a2 28 API calls 48746->48747 48748 355b76 48747->48748 48749 3420f6 28 API calls 48748->48749 48750 355b86 48749->48750 48751 3420f6 28 API calls 48750->48751 48752 355b98 48751->48752 48753 35beac 28 API calls 48752->48753 48754 355ba1 48753->48754 48755 3570c4 48754->48755 48757 355bc1 GetTickCount 48754->48757 48758 355d6a 48754->48758 48756 341e8d 11 API calls 48755->48756 48759 3570cd 48756->48759 48760 35bc1f 28 API calls 48757->48760 48758->48755 48821 355d20 48758->48821 48763 341fd8 11 API calls 48759->48763 48761 355bd2 48760->48761 48764 35bb77 GetTickCount 48761->48764 48765 3570d9 48763->48765 48766 355bde 48764->48766 48767 341fd8 11 API calls 48765->48767 48769 35bc1f 28 API calls 48766->48769 48768 3570e5 48767->48768 48770 355be9 48769->48770 48771 35bb27 30 API calls 48770->48771 48772 355bf7 48771->48772 48773 35bdaf 28 API calls 48772->48773 48774 355c05 48773->48774 48775 341e65 28 API calls 48774->48775 48776 355c13 48775->48776 48822 342f31 28 API calls 48776->48822 48778 355c21 48823 342ea1 28 API calls 48778->48823 48780 355c30 48781 342f10 28 API calls 48780->48781 48782 355c3f 48781->48782 48824 342ea1 28 API calls 48782->48824 48784 355c4e 48785 342f10 28 API calls 48784->48785 48786 355c5a 48785->48786 48825 342ea1 28 API calls 48786->48825 48788 355c64 48826 344aa1 60 API calls ctype 48788->48826 48790 355c73 48791 341fd8 11 API calls 48790->48791 48792 355c7c 48791->48792 48793 341fd8 11 API calls 48792->48793 48794 355c88 48793->48794 48795 341fd8 11 API calls 48794->48795 48796 355c94 48795->48796 48797 341fd8 11 API calls 48796->48797 48798 355ca0 48797->48798 48799 341fd8 11 API calls 48798->48799 48800 355cac 48799->48800 48801 341fd8 11 API calls 48800->48801 48802 355cb8 48801->48802 48803 341f09 11 API calls 48802->48803 48804 355cc1 48803->48804 48805 341fd8 11 API calls 48804->48805 48806 355cca 48805->48806 48807 341fd8 11 API calls 48806->48807 48808 355cd3 48807->48808 48809 341e65 28 API calls 48808->48809 48810 355cde 48809->48810 48811 37bb2c _strftime 39 API calls 48810->48811 48812 355ceb 48811->48812 48813 355d16 48812->48813 48814 355cf0 48812->48814 48815 341e65 28 API calls 48813->48815 48816 355cfe 48814->48816 48817 355d09 48814->48817 48815->48821 48827 344ff4 81 API calls 48816->48827 48819 344f51 104 API calls 48817->48819 48820 355d04 48819->48820 48820->48755 48821->48755 48828 3450e4 83 API calls 48821->48828 48822->48778 48823->48780 48824->48784 48825->48788 48826->48790 48827->48820 48828->48820 48829->48659 48830->48664 48831->48666 48835 34f7fd 48833->48835 48834 353584 3 API calls 48834->48835 48835->48834 48836 34f8a1 48835->48836 48838 34f891 Sleep 48835->48838 48855 34f82f 48835->48855 48839 349097 28 API calls 48836->48839 48837 349097 28 API calls 48837->48855 48838->48835 48842 34f8ac 48839->48842 48841 35bcef 28 API calls 48841->48855 48843 35bcef 28 API calls 48842->48843 48844 34f8b8 48843->48844 48868 35384f 14 API calls 48844->48868 48847 341f09 11 API calls 48847->48855 48848 34f8cb 48849 341f09 11 API calls 48848->48849 48851 34f8d7 48849->48851 48850 342093 28 API calls 48850->48855 48852 342093 28 API calls 48851->48852 48853 34f8e8 48852->48853 48856 3537aa 14 API calls 48853->48856 48854 3537aa 14 API calls 48854->48855 48855->48837 48855->48838 48855->48841 48855->48847 48855->48850 48855->48854 48866 34d0d1 111 API calls ___scrt_fastfail 48855->48866 48867 35384f 14 API calls 48855->48867 48857 34f8fb 48856->48857 48869 35288b TerminateProcess WaitForSingleObject 48857->48869 48859 34f903 ExitProcess 48870 352829 61 API calls 48865->48870 48867->48855 48868->48848 48869->48859

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 00353584: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?), ref: 003535A4
                                      • Part of subcall function 00353584: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,003B52F0), ref: 003535C2
                                      • Part of subcall function 00353584: RegCloseKey.KERNELBASE(?), ref: 003535CD
                                    • Sleep.KERNELBASE(00000BB8), ref: 0034F896
                                    • ExitProcess.KERNEL32 ref: 0034F905
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseExitOpenProcessQuerySleepValue
                                    • String ID: 5.1.3 Pro$override$pth_unenc
                                    • API String ID: 2281282204-1392497409
                                    • Opcode ID: a806a46fbd519a2829a1558b89a8106cb5bd5aaa81e5ac0bc46869c4e2b3a778
                                    • Instruction ID: 24e5761bc48010e5569c81cc8a2b72021c0fe295345e3b42cc6b1ee5140d99fd
                                    • Opcode Fuzzy Hash: a806a46fbd519a2829a1558b89a8106cb5bd5aaa81e5ac0bc46869c4e2b3a778
                                    • Instruction Fuzzy Hash: C4212861F146002BD60B77798C97A6E79D9EBC5710F40092CF8095F2D6EE25AE0987A3

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1252 3738c8-3738e2 CryptAcquireContextA 1253 3738e4 1252->1253 1254 3738e9-3738f8 CryptGenRandom 1252->1254 1255 3738e6-3738e7 1253->1255 1256 3738fe-373908 CryptReleaseContext 1254->1256 1257 3738fa-3738fc 1254->1257 1258 37390a-37390c 1255->1258 1256->1258 1257->1255
                                    APIs
                                    • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00373550,00000034,?,?,02B0D780), ref: 003738DA
                                    • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,003735E3,00000000,?,00000000), ref: 003738F0
                                    • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,003735E3,00000000,?,00000000,0035E2E2), ref: 00373902
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$Context$AcquireRandomRelease
                                    • String ID:
                                    • API String ID: 1815803762-0
                                    • Opcode ID: f907447946e9215b6d7c1f4bc9414585a89ba44c8bf72c493617b7cdd9027ca2
                                    • Instruction ID: 062049d496b04146d5965c9481f0443cda9d740f3241275465da4913d1a44b2c
                                    • Opcode Fuzzy Hash: f907447946e9215b6d7c1f4bc9414585a89ba44c8bf72c493617b7cdd9027ca2
                                    • Instruction Fuzzy Hash: 94E09231248211BBEB320F15AC09F563A69EB85760F22453AF229E40E4D6674804E555

                                    Control-flow Graph

                                    APIs
                                    • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0034EA1C), ref: 0035CBF6
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CBFF
                                    • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0034EA1C), ref: 0035CC16
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CC19
                                    • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0034EA1C), ref: 0035CC2B
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CC2E
                                    • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0034EA1C), ref: 0035CC3F
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CC42
                                    • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0034EA1C), ref: 0035CC54
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CC57
                                    • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0034EA1C), ref: 0035CC63
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CC66
                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0034EA1C), ref: 0035CC77
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CC7A
                                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0034EA1C), ref: 0035CC8B
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CC8E
                                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0034EA1C), ref: 0035CC9F
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CCA2
                                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0034EA1C), ref: 0035CCB3
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CCB6
                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0034EA1C), ref: 0035CCC7
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CCCA
                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0034EA1C), ref: 0035CCDB
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CCDE
                                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0034EA1C), ref: 0035CCEF
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CCF2
                                    • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0034EA1C), ref: 0035CD03
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CD06
                                    • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0034EA1C), ref: 0035CD14
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CD17
                                    • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0034EA1C), ref: 0035CD28
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CD2B
                                    • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0034EA1C), ref: 0035CD38
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CD3B
                                    • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0034EA1C), ref: 0035CD48
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CD4B
                                    • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0034EA1C), ref: 0035CD5D
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CD60
                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0034EA1C), ref: 0035CD6D
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CD70
                                    • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0034EA1C), ref: 0035CD81
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CD84
                                    • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0034EA1C), ref: 0035CD95
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CD98
                                    • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0034EA1C), ref: 0035CDAA
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CDAD
                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0034EA1C), ref: 0035CDBA
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CDBD
                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0034EA1C), ref: 0035CDCA
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CDCD
                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0034EA1C), ref: 0035CDDA
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035CDDD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad$HandleModule
                                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                    • API String ID: 4236061018-3687161714
                                    • Opcode ID: 6218eedcbf3241a5bc53f5de4991c4095fefcb14e95d044b624029328108a318
                                    • Instruction ID: dd9d97d6911c047bd221df2e37ad7f4b0f601a22925972f16ecd8e303ce4bb14
                                    • Opcode Fuzzy Hash: 6218eedcbf3241a5bc53f5de4991c4095fefcb14e95d044b624029328108a318
                                    • Instruction Fuzzy Hash: 4041E5B0EE031C79DA13BBB65C4DD5B3E9CE946BA97011927F218D3151D9B8D801CFA8

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 5 34ea00-34ea82 call 35cbe1 GetModuleFileNameW call 34f3fe call 3420f6 * 2 call 35beac call 34fb52 call 341e8d call 37fd50 22 34ea84-34eac9 call 34fbee call 341e65 call 341fab call 350f72 call 34fb9f call 34f3eb 5->22 23 34eace-34eb96 call 341e65 call 341fab call 341e65 call 34531e call 346383 call 341fe2 call 341fd8 * 2 call 341e65 call 341fc0 call 345aa6 call 341e65 call 3451e3 call 341e65 call 3451e3 5->23 49 34ef2d-34ef3e call 341fd8 22->49 69 34eb98-34ebe3 call 346c59 call 341fe2 call 341fd8 call 341fab call 353584 23->69 70 34ebe9-34ec04 call 341e65 call 34b9f8 23->70 69->70 100 34f38a-34f3a5 call 341fab call 3539e4 call 3524b0 69->100 79 34ec06-34ec25 call 341fab call 353584 70->79 80 34ec3e-34ec45 call 34d0a4 70->80 79->80 99 34ec27-34ec38 call 341fab call 3539e4 79->99 88 34ec47-34ec49 80->88 89 34ec4e-34ec55 80->89 92 34ef2c 88->92 93 34ec57 89->93 94 34ec59-34ec65 call 35b354 89->94 92->49 93->94 104 34ec67-34ec69 94->104 105 34ec6e-34ec72 94->105 115 34ec3d 99->115 126 34f3aa-34f3db call 35bcef call 341f04 call 353a5e call 341f09 * 2 100->126 104->105 108 34ec74-34ec7b call 347751 105->108 109 34ecb1-34ecc4 call 341e65 call 341fab 105->109 119 34ec87-34ec9a call 341e65 call 341fab 108->119 120 34ec7d-34ec82 call 347773 call 34729b 108->120 128 34ecc6 call 347790 109->128 129 34eccb-34ed53 call 341e65 call 35bcef call 341f13 call 341f09 call 341e65 call 341fab call 341e65 call 341fab call 341e65 call 341fab call 341e65 call 341fab 109->129 115->80 119->109 141 34ec9c-34eca2 119->141 120->119 156 34f3e0-34f3ea call 34dd7d call 354f65 126->156 128->129 177 34ed55-34ed6e call 341e65 call 341fab call 37bb56 129->177 178 34edbb-34edbf 129->178 141->109 144 34eca4-34ecaa 141->144 144->109 147 34ecac call 34729b 144->147 147->109 177->178 203 34ed70-34ed9c call 341e65 call 341fab call 341e65 call 341fab call 34da6f 177->203 179 34edc5-34edcc 178->179 180 34ef41-34efa1 call 376f10 call 34247c call 341fab * 2 call 353733 call 349092 178->180 183 34edce-34ee48 call 341e65 call 341fab call 341e65 call 341fab call 341e65 call 341fab call 341e65 call 341fab call 341e65 call 341fab call 34ce34 179->183 184 34ee4a-34ee54 call 349092 179->184 234 34efa6-34effa call 341e65 call 341fab call 342093 call 341fab call 3537aa call 341e65 call 341fab call 37bb2c 180->234 193 34ee59-34ee7d call 34247c call 374829 183->193 184->193 211 34ee8c 193->211 212 34ee7f-34ee8a call 376f10 193->212 248 34eda1-34edb6 call 341f13 call 341f09 203->248 217 34ee8e-34ef03 call 341f04 call 37f859 call 34247c call 341fab call 34247c call 341fab call 353982 call 374832 call 341e65 call 34b9f8 211->217 212->217 217->234 288 34ef09-34ef28 call 341e65 call 35bcef call 34f4af 217->288 286 34f017-34f019 234->286 287 34effc 234->287 248->178 290 34f01f 286->290 291 34f01b-34f01d 286->291 289 34effe-34f015 call 35ce2c CreateThread 287->289 288->234 306 34ef2a 288->306 294 34f025-34f101 call 342093 * 2 call 35b580 call 341e65 call 341fab call 341e65 call 341fab call 341e65 call 341fab call 37bb2c call 341e65 call 341fab call 341e65 call 341fab call 341e65 call 341fab call 341e65 call 341fab StrToIntA call 349e1f call 341e65 call 341fab 289->294 290->294 291->289 344 34f103-34f13a call 37455e call 341e65 call 341fab CreateThread 294->344 345 34f13c 294->345 306->92 346 34f13e-34f156 call 341e65 call 341fab 344->346 345->346 356 34f194-34f1a7 call 341e65 call 341fab 346->356 357 34f158-34f18f call 37455e call 341e65 call 341fab CreateThread 346->357 367 34f207-34f21a call 341e65 call 341fab 356->367 368 34f1a9-34f202 call 341e65 call 341fab call 341e65 call 341fab call 34da23 call 341f13 call 341f09 CreateThread 356->368 357->356 379 34f255-34f279 call 35b69e call 341f13 call 341f09 367->379 380 34f21c-34f250 call 341e65 call 341fab call 341e65 call 341fab call 37bb2c call 34c19d 367->380 368->367 400 34f27e-34f291 CreateThread 379->400 401 34f27b-34f27c SetProcessDEPPolicy 379->401 380->379 404 34f293-34f29d CreateThread 400->404 405 34f29f-34f2a6 400->405 401->400 404->405 409 34f2b4-34f2bb 405->409 410 34f2a8-34f2b2 CreateThread 405->410 413 34f2bd-34f2c0 409->413 414 34f2c9 409->414 410->409 415 34f307-34f322 call 341fab call 35353a 413->415 416 34f2c2-34f2c7 413->416 418 34f2ce-34f302 call 342093 call 3452fd call 342093 call 35b580 call 341fd8 414->418 415->156 427 34f328-34f368 call 35bcef call 341f04 call 353656 call 341f09 call 341f04 415->427 416->418 418->415 443 34f381-34f386 DeleteFileW 427->443 444 34f388 443->444 445 34f36a-34f36d 443->445 444->126 445->126 446 34f36f-34f37c Sleep call 341f04 445->446 446->443
                                    APIs
                                      • Part of subcall function 0035CBE1: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0034EA1C), ref: 0035CBF6
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CBFF
                                      • Part of subcall function 0035CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0034EA1C), ref: 0035CC16
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CC19
                                      • Part of subcall function 0035CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0034EA1C), ref: 0035CC2B
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CC2E
                                      • Part of subcall function 0035CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0034EA1C), ref: 0035CC3F
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CC42
                                      • Part of subcall function 0035CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0034EA1C), ref: 0035CC54
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CC57
                                      • Part of subcall function 0035CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0034EA1C), ref: 0035CC63
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CC66
                                      • Part of subcall function 0035CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0034EA1C), ref: 0035CC77
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CC7A
                                      • Part of subcall function 0035CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0034EA1C), ref: 0035CC8B
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CC8E
                                      • Part of subcall function 0035CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0034EA1C), ref: 0035CC9F
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CCA2
                                      • Part of subcall function 0035CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0034EA1C), ref: 0035CCB3
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CCB6
                                      • Part of subcall function 0035CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0034EA1C), ref: 0035CCC7
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CCCA
                                      • Part of subcall function 0035CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0034EA1C), ref: 0035CCDB
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CCDE
                                      • Part of subcall function 0035CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0034EA1C), ref: 0035CCEF
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CCF2
                                      • Part of subcall function 0035CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0034EA1C), ref: 0035CD03
                                      • Part of subcall function 0035CBE1: GetProcAddress.KERNEL32(00000000), ref: 0035CD06
                                      • Part of subcall function 0035CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0034EA1C), ref: 0035CD14
                                    • GetModuleFileNameW.KERNEL32(00000000,c:\program files (x86)\internet explorer\iexplore.exe,00000104), ref: 0034EA29
                                      • Part of subcall function 00350F72: __EH_prolog.LIBCMT ref: 00350F77
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                    • String ID: S;$ S;$8S;$8S;$Access Level: $Administrator$Exe$Inj$PS;$Remcos Agent initialized$Software\$User$c:\program files (x86)\internet explorer\iexplore.exe$dM;$del$del$exepath$licence$license_code.txt$P;$P;$P;$P;$P;$P;$P;$P;$P;$P;$P;$P;$P;$P;$P;
                                    • API String ID: 2830904901-1067234242
                                    • Opcode ID: 2fa997fd60ec17a32118ef066086c77cfde9cff8de3accdf8d44ad48d3dd0e33
                                    • Instruction ID: aa3561229b4f555613b606aa79a4587e91d0f788abfa80993b32f667a4cd7b53
                                    • Opcode Fuzzy Hash: 2fa997fd60ec17a32118ef066086c77cfde9cff8de3accdf8d44ad48d3dd0e33
                                    • Instruction Fuzzy Hash: 54323964B14B002BDB1BB7709C67F7E26D99F81B80F84092DF9425F2D3DE64AD898351

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 448 354f65-354fad call 3420df call 35b944 call 3420df call 341e65 call 341fab call 37bb2c 461 354fbc-355008 call 342093 call 341e65 call 3420f6 call 35beac call 34489e call 341e65 call 34b9f8 448->461 462 354faf-354fb6 Sleep 448->462 477 35507c-355117 call 342093 call 341e65 call 3420f6 call 35beac call 341e65 * 2 call 346c59 call 342f10 call 341fe2 call 341fd8 * 2 call 341e65 call 345b05 461->477 478 35500a-355079 call 341e65 call 34247c call 341e65 call 341fab call 341e65 call 34247c call 341e65 call 341fab call 341e65 call 34247c call 341e65 call 341fab call 34473d 461->478 462->461 531 355127-35512e 477->531 532 355119-355125 477->532 478->477 533 355133-3551c5 call 345aa6 call 34531e call 346383 call 342f10 call 342093 call 35b580 call 341fd8 * 2 call 341e65 call 341fab call 341e65 call 341fab call 354f24 531->533 532->533 560 3551c7-35520b WSAGetLastError call 35cb72 call 3452fd call 342093 call 35b580 call 341fd8 533->560 561 355210-35521e call 34482d 533->561 584 355ade-355af0 call 344e26 call 3421fa 560->584 566 355220-355246 call 342093 * 2 call 35b580 561->566 567 35524b-355260 call 344f51 call 3448c8 561->567 566->584 583 355266-3553b9 call 341e65 * 2 call 34531e call 346383 call 342f10 call 346383 call 342f10 call 342093 call 35b580 call 341fd8 * 4 call 35b871 call 3545f8 call 349097 call 381ed1 call 341e65 call 3420f6 call 34247c call 341fab * 2 call 353733 567->583 567->584 648 3553cd-3553f4 call 341fab call 3535e1 583->648 649 3553bb-3553c8 call 345aa6 583->649 597 355af2-355b12 call 341e65 call 341fab call 37bb2c Sleep 584->597 598 355b18-355b20 call 341e8d 584->598 597->598 598->477 655 3553f6-3553f8 648->655 656 3553fb-3557ba call 34417e call 34ddc4 call 35bcd3 call 35bdaf call 35bc1f call 341e65 GetTickCount call 35bc1f call 35bb77 call 35bc1f * 2 call 35bb27 call 35bdaf * 5 call 34f90c call 35bdaf call 342f31 call 342ea1 call 342f10 call 342ea1 call 342f10 * 3 call 342ea1 call 342f10 call 346383 call 342f10 call 346383 call 342f10 call 342ea1 call 342f10 call 342ea1 call 342f10 call 342ea1 call 342f10 call 342ea1 call 342f10 call 342ea1 call 342f10 call 342ea1 call 342f10 call 342ea1 call 342f10 call 346383 call 342f10 * 5 call 342ea1 call 342f10 call 342ea1 call 342f10 * 7 call 342ea1 648->656 649->648 655->656 782 3557bc call 344aa1 656->782 783 3557c1-355a45 call 341fd8 * 50 call 341f09 call 341fd8 * 6 call 341f09 call 344c10 782->783 901 355a4a-355a51 783->901 902 355a65-355a6c 901->902 903 355a53-355a5a 901->903 904 355a6e-355a73 call 34b08c 902->904 905 355a78-355aaa call 345a6b call 342093 * 2 call 35b580 902->905 903->902 906 355a5c-355a5e 903->906 904->905 917 355aac-355ab8 CreateThread 905->917 918 355abe-355ad9 call 341fd8 * 2 call 341f09 905->918 906->902 917->918 918->584
                                    APIs
                                    • Sleep.KERNEL32(00000000,00000029,003B52F0,003B50E4,00000000), ref: 00354FB6
                                    • WSAGetLastError.WS2_32(00000000,00000001), ref: 003551C7
                                    • Sleep.KERNELBASE(00000000,00000002), ref: 00355B12
                                      • Part of subcall function 0035B580: GetLocalTime.KERNEL32(00000000), ref: 0035B59A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep$ErrorLastLocalTime
                                    • String ID: | $%I64u$5.1.3 Pro$8S;$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PS;$TLS Off$TLS On $c:\program files (x86)\internet explorer\iexplore.exe$dM;$hlight$name$N;$N;$P;$P;$P;
                                    • API String ID: 524882891-3923935547
                                    • Opcode ID: 0528d1f9499c033778367ca0275cad0adad999f935645991ed312dc32fb7ffa8
                                    • Instruction ID: fabbe63e0ccc50d4a55e44e89006d7aac39c47b6de26a78eabf864012313a808
                                    • Opcode Fuzzy Hash: 0528d1f9499c033778367ca0275cad0adad999f935645991ed312dc32fb7ffa8
                                    • Instruction Fuzzy Hash: C1522C31A405145ACB1BF735DC52AFEB3F59F50300F9046A9F80A6F1E6EF306E8A8A55

                                    Control-flow Graph

                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000000FF,00000000,003B4EF8,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344E38
                                    • SetEvent.KERNEL32(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344E43
                                    • CloseHandle.KERNELBASE(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344E4C
                                    • closesocket.WS2_32(?), ref: 00344E5A
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344E91
                                    • SetEvent.KERNEL32(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344EA2
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344EA9
                                    • SetEvent.KERNEL32(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344EBA
                                    • CloseHandle.KERNEL32(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344EBF
                                    • CloseHandle.KERNEL32(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344EC4
                                    • SetEvent.KERNEL32(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344ED1
                                    • CloseHandle.KERNEL32(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344ED6
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                    • String ID:
                                    • API String ID: 3658366068-0
                                    • Opcode ID: bc6f73a96a95e16e25a95220b6bd3cb4976c3b5ac0c84eeaf9ef8341296fda76
                                    • Instruction ID: 6957fe7e19a00d3570a7b5688ead534a717f584cf16195d8ea1548a991660898
                                    • Opcode Fuzzy Hash: bc6f73a96a95e16e25a95220b6bd3cb4976c3b5ac0c84eeaf9ef8341296fda76
                                    • Instruction Fuzzy Hash: C2212931040B04AFDB326B25DC49B27BBE5FF40326F114A2EE1E2059F1CB62B851DB54

                                    Control-flow Graph

                                    APIs
                                    • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0034DBD5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LongNamePath
                                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                    • API String ID: 82841172-425784914
                                    • Opcode ID: a4f909f3fecf0938b725c3b7cbfb23660e9cca70f93e7c16f23b4e1453ea8cd6
                                    • Instruction ID: ef00f7f87488c8742b8d8f6ab034e2455647d126ab9e49702d2429b9a53ca5d6
                                    • Opcode Fuzzy Hash: a4f909f3fecf0938b725c3b7cbfb23660e9cca70f93e7c16f23b4e1453ea8cd6
                                    • Instruction Fuzzy Hash: ED4151311082009AD217F660DD92DAFB7E8EE91751F500A2EF1469E4E1FF60BD8EC652

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CountEventTick
                                    • String ID: !D4$N;
                                    • API String ID: 180926312-3819397142
                                    • Opcode ID: 56df06c383580c171c63fdc879436a329b0c2f006487e39f82d514f71bf31fdb
                                    • Instruction ID: b6bdb0cac812dc687fac9ed2c7275dbcc7b04c6dc2aea3edbb0d07f496147012
                                    • Opcode Fuzzy Hash: 56df06c383580c171c63fdc879436a329b0c2f006487e39f82d514f71bf31fdb
                                    • Instruction Fuzzy Hash: 6F516E316086409AC726FB35D852EEFB3E9AF95301F90492DF9465F1E2EF30694EC642

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1162 344f51-344f5f 1163 344f65-344f6c 1162->1163 1164 344fea 1162->1164 1165 344f74-344f7b 1163->1165 1166 344f6e-344f72 1163->1166 1167 344fec-344ff1 1164->1167 1168 344fc0-344fe8 CreateEventA CreateThread 1165->1168 1169 344f7d-344fbb GetLocalTime call 35bc1f call 3452fd call 342093 call 35b580 call 341fd8 1165->1169 1166->1168 1168->1167 1169->1168
                                    APIs
                                    • GetLocalTime.KERNEL32(00000001,003B4EE0,003B5598,?,?,?,?,00355D11,?,00000001), ref: 00344F81
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,003B4EE0,003B5598,?,?,?,?,00355D11,?,00000001), ref: 00344FCD
                                    • CreateThread.KERNELBASE(00000000,00000000,00345150,?,00000000,00000000), ref: 00344FE0
                                    Strings
                                    • KeepAlive | Enabled | Timeout: , xrefs: 00344F94
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Create$EventLocalThreadTime
                                    • String ID: KeepAlive | Enabled | Timeout:
                                    • API String ID: 2532271599-1507639952
                                    • Opcode ID: 1368df516d2876cd7db113274e55808fbcf2fbab54e83a73cede1f3becff8e2a
                                    • Instruction ID: 473f291721d0f21290c4a7985242f5f1f0de15b341c6074eee9b5db89f7512fd
                                    • Opcode Fuzzy Hash: 1368df516d2876cd7db113274e55808fbcf2fbab54e83a73cede1f3becff8e2a
                                    • Instruction Fuzzy Hash: 0811A3319006886EDB23ABBA9C0DF9BBFEC9BD6710F04451EF8425A251D6B16449CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1179 3537aa-3537c1 RegCreateKeyA 1180 3537c3-3537f8 call 34247c call 341fab RegSetValueExA RegCloseKey 1179->1180 1181 3537fa 1179->1181 1183 3537fc-35380a call 341fd8 1180->1183 1181->1183
                                    APIs
                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 003537B9
                                    • RegSetValueExA.KERNELBASE(?,003A74C8,00000000,?,00000000,00000000,003B52F0,?,?,0034F88E,003A74C8,5.1.3 Pro), ref: 003537E1
                                    • RegCloseKey.ADVAPI32(?,?,?,0034F88E,003A74C8,5.1.3 Pro), ref: 003537EC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID: pth_unenc
                                    • API String ID: 1818849710-4028850238
                                    • Opcode ID: 8671c30c560e5821a55ee511ec51ada86f9779fe2a71f40efccc909d54e208b2
                                    • Instruction ID: fb425c1498c7b759cd70c4995d2d936223ee775fe99ce51127f95cfc1474437c
                                    • Opcode Fuzzy Hash: 8671c30c560e5821a55ee511ec51ada86f9779fe2a71f40efccc909d54e208b2
                                    • Instruction Fuzzy Hash: E8F06272540118FBDB02AFA4DC46EEA376CEF08751F104256BD16AA120EB329E149B50

                                    Control-flow Graph

                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,003B4F50), ref: 00344DB3
                                    • CreateThread.KERNELBASE(00000000,00000000,?,003B4EF8,00000000,00000000), ref: 00344DC7
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00344DD2
                                    • CloseHandle.KERNEL32(?,?,00000000), ref: 00344DDB
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                    • String ID:
                                    • API String ID: 3360349984-0
                                    • Opcode ID: c801a8df9f4627e9a37b2a022df0fd73d80bab679a77232eeb0ccf39441a0521
                                    • Instruction ID: 19012f12b213837ba2fcfb4c2e4caf8f3c1d9b4680a9745bc43af009a08a71ae
                                    • Opcode Fuzzy Hash: c801a8df9f4627e9a37b2a022df0fd73d80bab679a77232eeb0ccf39441a0521
                                    • Instruction Fuzzy Hash: 9141A3716483046FC712EB61CC55EBFB7EDEF95310F400A2DF4929A291DF20B9498761

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1237 353a5e-353a74 RegOpenKeyExW 1238 353a76-353a78 1237->1238 1239 353a7a-353a8a RegDeleteValueW 1237->1239 1240 353a8c-353a8f 1238->1240 1239->1240
                                    APIs
                                    • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0034D17F,00000000,003B52D8,003B52F0,?,pth_unenc), ref: 00353A6C
                                    • RegDeleteValueW.KERNELBASE(?,?,?,pth_unenc), ref: 00353A80
                                    Strings
                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00353A6A
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteOpenValue
                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                    • API String ID: 2654517830-1051519024
                                    • Opcode ID: dc04361d6c0a466135b5456d9352abc0214923377c220d00f3841bdd8ccb56d6
                                    • Instruction ID: 9c52b4d21c67fec40298f1fa52679eaa27d8a9737b62425535da098cd298cb4c
                                    • Opcode Fuzzy Hash: dc04361d6c0a466135b5456d9352abc0214923377c220d00f3841bdd8ccb56d6
                                    • Instruction Fuzzy Hash: 0BE0C231244208BBEF125F71DD06FBA7B2CDB01B41F10029ABA06921A1C6238A089660

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1241 34d0a4-34d0d0 call 341fab CreateMutexA GetLastError
                                    APIs
                                    • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0034EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,003A60CC,00000003,00000000), ref: 0034D0B3
                                    • GetLastError.KERNEL32 ref: 0034D0BE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateErrorLastMutex
                                    • String ID: S;
                                    • API String ID: 1925916568-3885070401
                                    • Opcode ID: 52764a7e82322dd88151a3524b8b4e8fa33d6e756e269b378091bbb67bbb398a
                                    • Instruction ID: dc1aa527fed2e0233628ef97b2dc53aee50bf56355f7d9c4ca785be52abbcddf
                                    • Opcode Fuzzy Hash: 52764a7e82322dd88151a3524b8b4e8fa33d6e756e269b378091bbb67bbb398a
                                    • Instruction Fuzzy Hash: 4CD01274A15600ABEB0A6B74DC597593998D744701F40092FB20BC99E0CA6644904511

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1244 353584-3535ac RegOpenKeyExA 1245 3535ae-3535d9 RegQueryValueExA RegCloseKey 1244->1245 1246 3535db 1244->1246 1247 3535dd-3535e0 1245->1247 1246->1247
                                    APIs
                                    • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?), ref: 003535A4
                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,003B52F0), ref: 003535C2
                                    • RegCloseKey.KERNELBASE(?), ref: 003535CD
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID:
                                    • API String ID: 3677997916-0
                                    • Opcode ID: d2d2a6cf5a1f4a661f6a0f1395591c86a468082062c2ea37bfa3cd3abe4997e1
                                    • Instruction ID: f81657811dba3a9133bbe470757b088b2e8c19ea81a572c004062ac28c69f6ac
                                    • Opcode Fuzzy Hash: d2d2a6cf5a1f4a661f6a0f1395591c86a468082062c2ea37bfa3cd3abe4997e1
                                    • Instruction Fuzzy Hash: 64F01D76900218FFDF119FA49C45FED7BBCEB04751F104596BE14E6250E6315B149B90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1248 3538b2-3538c8 RegCreateKeyA 1249 3538f4 1248->1249 1250 3538ca-3538f2 RegSetValueExA RegCloseKey 1248->1250 1251 3538f6-3538f9 1249->1251 1250->1251
                                    APIs
                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,003A60B4), ref: 003538C0
                                    • RegSetValueExA.KERNELBASE(003A60B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0034C18D,003A6C58,00000001,000000AF,003A60B4), ref: 003538DB
                                    • RegCloseKey.ADVAPI32(003A60B4,?,?,?,0034C18D,003A6C58,00000001,000000AF,003A60B4), ref: 003538E6
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID:
                                    • API String ID: 1818849710-0
                                    • Opcode ID: d775fc289f6a562864b0c4d028040cc38ececdec58fa5d507d06966afba746aa
                                    • Instruction ID: 6ce7e40d6bca4c6f7f6fd4e74ce42c26ad7f5a606929d7d3930e5ba51f4a1580
                                    • Opcode Fuzzy Hash: d775fc289f6a562864b0c4d028040cc38ececdec58fa5d507d06966afba746aa
                                    • Instruction Fuzzy Hash: 8EE06572500218FBDF115F949C06FEA7B6CDF04791F104156BF1496260E6324E189790
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _wcslen
                                    • String ID: pQ;
                                    • API String ID: 176396367-3105567859
                                    • Opcode ID: c459820ab86b700c97dff10e48fc7ea6a103e799edb88e0e8531dfc84f0d4992
                                    • Instruction ID: 064db20debcb92b859bf23e7775694121e7e44f9d83d8c19daa2e4645ca9ac24
                                    • Opcode Fuzzy Hash: c459820ab86b700c97dff10e48fc7ea6a103e799edb88e0e8531dfc84f0d4992
                                    • Instruction Fuzzy Hash: 311193319006059BCB17EF68D852AEF7BF8AF54310F10411AF8565F2A1EF34B949CB90
                                    APIs
                                    • GlobalMemoryStatusEx.KERNELBASE(?), ref: 0035B85B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: GlobalMemoryStatus
                                    • String ID: @
                                    • API String ID: 1890195054-2766056989
                                    • Opcode ID: 37de8eebda7551fd7dfc6b1fcd6ae7d84db375d7cb1bd8b044b6e65627f749bb
                                    • Instruction ID: 4e903c4b94d89b480a5441e75582e373bfc687e4e2c37fd4b80b8e4559188f4b
                                    • Opcode Fuzzy Hash: 37de8eebda7551fd7dfc6b1fcd6ae7d84db375d7cb1bd8b044b6e65627f749bb
                                    • Instruction Fuzzy Hash: A0D017B58023189FC720DFA8E804A8DBBFCFB08214F00426AED49E3700E770A8008B84
                                    APIs
                                    • socket.WS2_32(?,00000001,00000006), ref: 00344852
                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0034530B,?,?,?,00000000,003B4EE0,003B5598,?,?,?,0034522E), ref: 0034488E
                                      • Part of subcall function 0034489E: WSAStartup.WS2_32(00000202,00000000), ref: 003448B3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateEventStartupsocket
                                    • String ID:
                                    • API String ID: 1953588214-0
                                    • Opcode ID: d7ccacb7b7b1ebaa1737805541a6f22326f5a39030934c62ebd49973c9f4db45
                                    • Instruction ID: 7babf32d6d1d79458a212a2eb4da798ff726b64cea54aa15ecbded1c6cb56d8d
                                    • Opcode Fuzzy Hash: d7ccacb7b7b1ebaa1737805541a6f22326f5a39030934c62ebd49973c9f4db45
                                    • Instruction Fuzzy Hash: 77017171408B809ED7368F29B8457877FE4AB19304F044E5EF1D697B91D7B2A441CF10
                                    APIs
                                    • GetForegroundWindow.USER32 ref: 0035BB49
                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 0035BB5C
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Window$ForegroundText
                                    • String ID:
                                    • API String ID: 29597999-0
                                    • Opcode ID: 83ea9f555e26695fe15ce477ca73f6b975a2821e1aec0ac7dd6500647ff22a33
                                    • Instruction ID: 08b4514d2022222fe2636bdfee8525b301616f6b35c110cae9f72fac83bb4201
                                    • Opcode Fuzzy Hash: 83ea9f555e26695fe15ce477ca73f6b975a2821e1aec0ac7dd6500647ff22a33
                                    • Instruction Fuzzy Hash: F4E04875A0032867F735A7A8AC8EFD5776C9708750F00019AB51CD61C2EDA5694487E1
                                    APIs
                                    • GetUserNameW.ADVAPI32(?,0034F25E), ref: 0035B6D3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: NameUser
                                    • String ID:
                                    • API String ID: 2645101109-0
                                    • Opcode ID: 0d2f34abbea4a08609139be002859d58f311ebfe49b9798cc561766f4113f8ff
                                    • Instruction ID: 67df522d3f1323af5120dbf546d614203b876b92007e68a8f849740a52ff9ff9
                                    • Opcode Fuzzy Hash: 0d2f34abbea4a08609139be002859d58f311ebfe49b9798cc561766f4113f8ff
                                    • Instruction Fuzzy Hash: 5F01FF7190011CABDF06EBD4DC45ADDB7BCAF44305F100166F505AB161EEB06A89CB94
                                    APIs
                                    • WSAStartup.WS2_32(00000202,00000000), ref: 003448B3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startup
                                    • String ID:
                                    • API String ID: 724789610-0
                                    • Opcode ID: 9a2d13ee236600cf058a02872e3449c7ee4afbe69ca434d43521ef60eeb38a39
                                    • Instruction ID: b456b55a9ce84572c21f678284e776e3929255e5d1f58ae6db73cebd79312267
                                    • Opcode Fuzzy Hash: 9a2d13ee236600cf058a02872e3449c7ee4afbe69ca434d43521ef60eeb38a39
                                    • Instruction Fuzzy Hash: 0AD022324A820C4EE622AAB8AC0F8A0771CC306715F0003AB6CB1836D2EA01131CC2A3
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: send
                                    • String ID:
                                    • API String ID: 2809346765-0
                                    • Opcode ID: 99ca6483b87c6f56e2d4cb1004e1807ddf7a2f6ff6451ecef38603643898b357
                                    • Instruction ID: 20b9c5555e9e81e3d1698cbb06d045571b386ee02029d4d715863d8758bc6671
                                    • Opcode Fuzzy Hash: 99ca6483b87c6f56e2d4cb1004e1807ddf7a2f6ff6451ecef38603643898b357
                                    • Instruction Fuzzy Hash: 8AB09279108202FFAA070B64CC048AB7EAAABC8380F00890DB1C781230C6328490AB22
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 003456E6
                                      • Part of subcall function 00344AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                    • __Init_thread_footer.LIBCMT ref: 00345723
                                    • CreatePipe.KERNEL32(003B6CCC,003B6CB4,003B6BD8,00000000,003A60CC,00000000), ref: 003457B6
                                    • CreatePipe.KERNEL32(003B6CB8,003B6CD4,003B6BD8,00000000), ref: 003457CC
                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,003B6BE8,003B6CBC), ref: 0034583F
                                    • Sleep.KERNEL32(0000012C,00000093,?), ref: 00345897
                                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 003458BC
                                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 003458E9
                                      • Part of subcall function 00374801: __onexit.LIBCMT ref: 00374807
                                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,003B4F90,003A60D0,00000062,003A60B4), ref: 003459E4
                                    • Sleep.KERNEL32(00000064,00000062,003A60B4), ref: 003459FE
                                    • TerminateProcess.KERNEL32(00000000), ref: 00345A17
                                    • CloseHandle.KERNEL32 ref: 00345A23
                                    • CloseHandle.KERNEL32 ref: 00345A2B
                                    • CloseHandle.KERNEL32 ref: 00345A3D
                                    • CloseHandle.KERNEL32 ref: 00345A45
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                    • String ID: 0l;$0l;$0l;$0l;$0l;$SystemDrive$cmd.exe$k;
                                    • API String ID: 2994406822-2000977384
                                    • Opcode ID: b82b9c9b92f71c0a3496c32f8b05722df7cc9c5603c3dfa0fdcd1d44f9bb8701
                                    • Instruction ID: b7d5a64ea37fe9fffd76ddd859b579805f2376ba719efd6f73141e4eecb43c28
                                    • Opcode Fuzzy Hash: b82b9c9b92f71c0a3496c32f8b05722df7cc9c5603c3dfa0fdcd1d44f9bb8701
                                    • Instruction Fuzzy Hash: E091B571A44208AFC713FF25EC43A6E7BEDEB44748F40062DF6859E2A3DE296C448B55
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 00352141
                                      • Part of subcall function 003538B2: RegCreateKeyA.ADVAPI32(80000001,00000000,003A60B4), ref: 003538C0
                                      • Part of subcall function 003538B2: RegSetValueExA.KERNELBASE(003A60B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0034C18D,003A6C58,00000001,000000AF,003A60B4), ref: 003538DB
                                      • Part of subcall function 003538B2: RegCloseKey.ADVAPI32(003A60B4,?,?,?,0034C18D,003A6C58,00000001,000000AF,003A60B4), ref: 003538E6
                                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00352181
                                    • CloseHandle.KERNEL32(00000000), ref: 00352190
                                    • CreateThread.KERNEL32(00000000,00000000,00352829,00000000,00000000,00000000), ref: 003521E6
                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00352455
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                    • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                    • API String ID: 3018269243-13974260
                                    • Opcode ID: 561480affe86a2e487bd4c690e80da185f5d8c50938426bbfaf31c1316a01c4f
                                    • Instruction ID: 3bade24318c73628f1b18e82721ff8d0ec27940c8d3edb63355f7e1f328b8461
                                    • Opcode Fuzzy Hash: 561480affe86a2e487bd4c690e80da185f5d8c50938426bbfaf31c1316a01c4f
                                    • Instruction Fuzzy Hash: 4C71A1316142005BC61BFB75CC57DAFB7E8EF96701F400A2DF4425E0A2EF20AA4DCA92
                                    APIs
                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0034BBEA
                                    • FindClose.KERNEL32(00000000), ref: 0034BC04
                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0034BD27
                                    • FindClose.KERNEL32(00000000), ref: 0034BD4D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$CloseFile$FirstNext
                                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                    • API String ID: 1164774033-3681987949
                                    • Opcode ID: de51088393ee01873d788b81911bd0ae93aed2768e9fdd0ec1ea67d7a8a5819c
                                    • Instruction ID: b8fd243bbe4036256762dc1e58224886772e82d95bacdebade076bf7c3df6fd4
                                    • Opcode Fuzzy Hash: de51088393ee01873d788b81911bd0ae93aed2768e9fdd0ec1ea67d7a8a5819c
                                    • Instruction Fuzzy Hash: 33515F319101199BDB16FBB5DC56EEEB7B8AF11300F50056AF0066E0D2EF707A8ACA51
                                    APIs
                                    • OpenClipboard.USER32 ref: 003568FD
                                    • EmptyClipboard.USER32 ref: 0035690B
                                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0035692B
                                    • GlobalLock.KERNEL32(00000000), ref: 00356934
                                    • GlobalUnlock.KERNEL32(00000000), ref: 0035696A
                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00356973
                                    • CloseClipboard.USER32 ref: 00356990
                                    • OpenClipboard.USER32 ref: 00356997
                                    • GetClipboardData.USER32(0000000D), ref: 003569A7
                                    • GlobalLock.KERNEL32(00000000), ref: 003569B0
                                    • GlobalUnlock.KERNEL32(00000000), ref: 003569B9
                                    • CloseClipboard.USER32 ref: 003569BF
                                      • Part of subcall function 00344AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                    • String ID: !D4
                                    • API String ID: 3520204547-1936690033
                                    • Opcode ID: 5958148f9bb78266b8c8030a462525b0b7dbc1172e4f561c6e7b0ed5792ae4b6
                                    • Instruction ID: fdf996c6f44e107d307f60c5b7e80085144cbeb54afe197d1cbd631150e8816f
                                    • Opcode Fuzzy Hash: 5958148f9bb78266b8c8030a462525b0b7dbc1172e4f561c6e7b0ed5792ae4b6
                                    • Instruction Fuzzy Hash: 11216035204600ABD716BF74DC9EBAE77ECAF94701F40052FF9068E1E1EF3598498622
                                    APIs
                                    • _wcslen.LIBCMT ref: 0034755C
                                    • CoGetObject.OLE32(?,00000024,003A6528,00000000), ref: 003475BD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Object_wcslen
                                    • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                    • API String ID: 240030777-3166923314
                                    • Opcode ID: e53ddf19376dc9ab27512943b99e858567b5f2590df45ee16561ef4b58585c93
                                    • Instruction ID: ae457c1e9e19915cd81c1087b19afd758f884a09abd499741262e2105a10f38a
                                    • Opcode Fuzzy Hash: e53ddf19376dc9ab27512943b99e858567b5f2590df45ee16561ef4b58585c93
                                    • Instruction Fuzzy Hash: F411CC76904218ABCB22EBE4C847EDEB7FCEB05710F14005AF808FF190DB74AA058671
                                    APIs
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,003B58E8), ref: 0035A7EF
                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0035A83E
                                    • GetLastError.KERNEL32 ref: 0035A84C
                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0035A884
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                    • String ID:
                                    • API String ID: 3587775597-0
                                    • Opcode ID: 805bf62e189d7201d500755d5f41c7a3e822bd35de2fb8f67c69fe6e2860e91f
                                    • Instruction ID: 226a0f32ecc875198a2b27127e88024848c805ee8f8bc456cc0fa6cc99eaa621
                                    • Opcode Fuzzy Hash: 805bf62e189d7201d500755d5f41c7a3e822bd35de2fb8f67c69fe6e2860e91f
                                    • Instruction Fuzzy Hash: 23813F71104304ABD316EB60D896EAFB7E8FF94300F50491EF5865A161EF70FA49CB92
                                    APIs
                                      • Part of subcall function 00388295: GetLastError.KERNEL32(?,0037F770,0037A875,0037F770,003B4EF8,?,0037CE65,FF8BC35D,003B4EF8,003B4EF8), ref: 00388299
                                      • Part of subcall function 00388295: _free.LIBCMT ref: 003882CC
                                      • Part of subcall function 00388295: SetLastError.KERNEL32(00000000,FF8BC35D,003B4EF8,003B4EF8), ref: 0038830D
                                      • Part of subcall function 00388295: _abort.LIBCMT ref: 00388313
                                      • Part of subcall function 00388295: _free.LIBCMT ref: 003882F4
                                      • Part of subcall function 00388295: SetLastError.KERNEL32(00000000,FF8BC35D,003B4EF8,003B4EF8), ref: 00388301
                                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0039279C
                                    • IsValidCodePage.KERNEL32(00000000), ref: 003927F7
                                    • IsValidLocale.KERNEL32(?,00000001), ref: 00392806
                                    • GetLocaleInfoW.KERNEL32(?,00001001,J8,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0039284E
                                    • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0039286D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                    • String ID: J8$J8$J8
                                    • API String ID: 745075371-2207707093
                                    • Opcode ID: 17dde28874967155dfc4bab110fd9d27aa958709f02ee67f40180ae937ff0b2f
                                    • Instruction ID: 00fe47576351b83192332e5145d947cf675612d3bb2e5c49125cd95c6a808e82
                                    • Opcode Fuzzy Hash: 17dde28874967155dfc4bab110fd9d27aa958709f02ee67f40180ae937ff0b2f
                                    • Instruction Fuzzy Hash: 96515071900A0ABBEF22EBA9CC45ABB73B8AF48700F054569F914EB191D7719940CBA1
                                    APIs
                                    • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0034C3D6
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0034C4A9
                                    • FindClose.KERNEL32(00000000), ref: 0034C4B8
                                    • FindClose.KERNEL32(00000000), ref: 0034C4E3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$CloseFile$FirstNext
                                    • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                    • API String ID: 1164774033-405221262
                                    • Opcode ID: adc86e61d035809f19c2033f88e6f4450fd5bf6ee24ba17285367cd012fb763d
                                    • Instruction ID: ba434e9fd0496bea184b6f3f37b8e036ee248826b4e08c17fab3c970482e9b8b
                                    • Opcode Fuzzy Hash: adc86e61d035809f19c2033f88e6f4450fd5bf6ee24ba17285367cd012fb763d
                                    • Instruction Fuzzy Hash: 7D3180319102195ACB17F765DD96AFE77FCEF11710F00012AF106AE1D2EF64B98ACA40
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,003B52D8,003B52F0,00000001), ref: 0035C37D
                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,003B52D8,003B52F0,00000001), ref: 0035C3AD
                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,003B52D8,003B52F0,00000001), ref: 0035C41F
                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,003B52D8,003B52F0,00000001), ref: 0035C42C
                                      • Part of subcall function 0035C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,003B52D8,003B52F0,00000001), ref: 0035C402
                                    • GetLastError.KERNEL32(?,?,?,?,?,003B52D8,003B52F0,00000001), ref: 0035C44D
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,003B52D8,003B52F0,00000001), ref: 0035C463
                                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,003B52D8,003B52F0,00000001), ref: 0035C46A
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,003B52D8,003B52F0,00000001), ref: 0035C473
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                    • String ID:
                                    • API String ID: 2341273852-0
                                    • Opcode ID: a0de371dbf19d7220253dc9c273a3d65d8b4c57c6e01914172c9f936ad02a211
                                    • Instruction ID: 7d17821c85895db1b613d56540711909601bfb46013491cb956d496864eb0e9d
                                    • Opcode Fuzzy Hash: a0de371dbf19d7220253dc9c273a3d65d8b4c57c6e01914172c9f936ad02a211
                                    • Instruction Fuzzy Hash: BC31757281031C6EDB23D7A5DC49FEA73BCAF05305F4405AAE959D2061EF399AC98A60
                                    APIs
                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00359DDC
                                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00359EA8
                                      • Part of subcall function 0035C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0034A87E), ref: 0035C52F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Find$CreateFirstNext
                                    • String ID: 8S;$PX;$PX;$N;$P;
                                    • API String ID: 341183262-1600610713
                                    • Opcode ID: b5b18c4094bc3c9fff908798a0db6a6f64938994d503a1970e6ff9a7b536bf80
                                    • Instruction ID: b2d32029e307199604ea3d65820d2db090a16cf9a18a489d013eb3c510cda7df
                                    • Opcode Fuzzy Hash: b5b18c4094bc3c9fff908798a0db6a6f64938994d503a1970e6ff9a7b536bf80
                                    • Instruction Fuzzy Hash: 8B811E315186409AC316FB21C852EEFB7E8AF91350F90492DF5965F1E2EF30AA4EC652
                                    APIs
                                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 003540D8
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 003540E4
                                      • Part of subcall function 00344AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 003542A5
                                    • GetProcAddress.KERNEL32(00000000), ref: 003542AC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressCloseCreateLibraryLoadProcsend
                                    • String ID: SHDeleteKeyW$Shlwapi.dll
                                    • API String ID: 2127411465-314212984
                                    • Opcode ID: c056d8248c9cf78a4136d1a132476ae81004fa867952e16094b850851b0fa098
                                    • Instruction ID: df45d2dc9d33e7ee752bd6b7d15daf8ebee4a1dd13f4b1dc3697332ce067ac1d
                                    • Opcode Fuzzy Hash: c056d8248c9cf78a4136d1a132476ae81004fa867952e16094b850851b0fa098
                                    • Instruction Fuzzy Hash: B7B1DC71A4420066C61BF774DC57DAF76E89F91741F80061CFC06AF1F2EE65AA8CC692
                                    APIs
                                      • Part of subcall function 0035798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0035799A
                                      • Part of subcall function 0035798D: OpenProcessToken.ADVAPI32(00000000), ref: 003579A1
                                      • Part of subcall function 0035798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 003579B3
                                      • Part of subcall function 0035798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 003579D2
                                      • Part of subcall function 0035798D: GetLastError.KERNEL32 ref: 003579D8
                                    • ExitWindowsEx.USER32(00000000,00000001), ref: 00356891
                                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 003568A6
                                    • GetProcAddress.KERNEL32(00000000), ref: 003568AD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                    • String ID: !D4$PowrProf.dll$SetSuspendState
                                    • API String ID: 1589313981-3540148386
                                    • Opcode ID: cd30bfb7614248719f9f26f2d6870039bb24f47f55f878a206759afb2dedfc55
                                    • Instruction ID: eb2a19b6e77d769aae0f625d95dded127a9d94304fbca987ace9c4726cff8365
                                    • Opcode Fuzzy Hash: cd30bfb7614248719f9f26f2d6870039bb24f47f55f878a206759afb2dedfc55
                                    • Instruction Fuzzy Hash: 472191216187005BCA17FBB09867EBE67DDDF52741F804C68B9425F5E3EE25A88DC321
                                    APIs
                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0034BA89
                                    • GetLastError.KERNEL32 ref: 0034BA93
                                    Strings
                                    • [Chrome StoredLogins found, cleared!], xrefs: 0034BAB9
                                    • [Chrome StoredLogins not found], xrefs: 0034BAAD
                                    • UserProfile, xrefs: 0034BA59
                                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0034BA54
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteErrorFileLast
                                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                    • API String ID: 2018770650-1062637481
                                    • Opcode ID: 3b248b30dab0ab9bdce6bc97803fca82823738d6ee57aeb233dc5d93622cccd7
                                    • Instruction ID: 191d104fdffd3b615c01b8bceed32a4dfab37794a3907e0f074f1b27d2eb7cb1
                                    • Opcode Fuzzy Hash: 3b248b30dab0ab9bdce6bc97803fca82823738d6ee57aeb233dc5d93622cccd7
                                    • Instruction Fuzzy Hash: A4018631A941055A8B07BBB9DC178FFB7A8ED12700B84161EF4425F1D2EF52A94987D2
                                    APIs
                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 0035799A
                                    • OpenProcessToken.ADVAPI32(00000000), ref: 003579A1
                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 003579B3
                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 003579D2
                                    • GetLastError.KERNEL32 ref: 003579D8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                    • String ID: SeShutdownPrivilege
                                    • API String ID: 3534403312-3733053543
                                    • Opcode ID: 517aae3749fc719eb82af33477b5971131841a5e7489b591a158370373051079
                                    • Instruction ID: d38e4edfdcf730dbdbdc46ce174daa6ba3c76eb4f3b4dc99d6a71dfa344ceee9
                                    • Opcode Fuzzy Hash: 517aae3749fc719eb82af33477b5971131841a5e7489b591a158370373051079
                                    • Instruction Fuzzy Hash: 89F034B1802129BBDB11ABA9EC0DBEFBFBCEF05311F00005AB905A1250D6364A04CBB1
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 00349293
                                      • Part of subcall function 003448C8: connect.WS2_32(?,?,?), ref: 003448E0
                                      • Part of subcall function 00344AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0034932F
                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0034938D
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 003493E5
                                    • FindClose.KERNEL32(00000000), ref: 003493FC
                                      • Part of subcall function 00344E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,003B4EF8,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344E38
                                      • Part of subcall function 00344E26: SetEvent.KERNEL32(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344E43
                                      • Part of subcall function 00344E26: CloseHandle.KERNELBASE(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344E4C
                                    • FindClose.KERNEL32(00000000), ref: 003495F4
                                      • Part of subcall function 00344AA1: WaitForSingleObject.KERNEL32(?,00000000,s\5L,?,?,00000004,?,?,00000004,003B4EE0,003B5598,00000000), ref: 00344B47
                                      • Part of subcall function 00344AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,003B4EE0,003B5598,00000000,?,?,?,?,?,00355C73), ref: 00344B75
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                    • String ID:
                                    • API String ID: 1824512719-0
                                    • Opcode ID: fb24450f81f0822dc2772905f9f45f83281f0fae6340158d2fc758ecc32e5f4a
                                    • Instruction ID: 881d6380ebd85e9c97284e69b004b6161d98e280370096f491627d952eaba69a
                                    • Opcode Fuzzy Hash: fb24450f81f0822dc2772905f9f45f83281f0fae6340158d2fc758ecc32e5f4a
                                    • Instruction Fuzzy Hash: C6B13E329001189ACB16EBA4DD96BEEB7B9AF05310F50426AF506AF1D1EF347F49CB50
                                    APIs
                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,003927DB,?,00000000), ref: 00392555
                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,003927DB,?,00000000), ref: 0039257E
                                    • GetACP.KERNEL32(?,?,003927DB,?,00000000), ref: 00392593
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID: ACP$OCP
                                    • API String ID: 2299586839-711371036
                                    • Opcode ID: 293105cf7f17910ba7d1c7a03737de4c14578f69282277ce57307a67db51cc62
                                    • Instruction ID: 8d52acdb3594109191570316fb71e025499385b0c3a74c3020bd002137ef968b
                                    • Opcode Fuzzy Hash: 293105cf7f17910ba7d1c7a03737de4c14578f69282277ce57307a67db51cc62
                                    • Instruction Fuzzy Hash: 6E21B366600904B7DF37DF55C811BABF3AAEB56B60F578425E909DB214E732DD40C390
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 003496A5
                                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0034971D
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00349746
                                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0034975D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$File$CloseFirstH_prologNext
                                    • String ID:
                                    • API String ID: 1157919129-0
                                    • Opcode ID: e92e226f0f18795175f6e472aee001d539851f4df6c945a56e89913a437dd6f1
                                    • Instruction ID: 57f0d9aafbd8ce4317daa6e4dbe1dd1bf19c546477297e031795ea7493ec819b
                                    • Opcode Fuzzy Hash: e92e226f0f18795175f6e472aee001d539851f4df6c945a56e89913a437dd6f1
                                    • Instruction Fuzzy Hash: 2A81F1329001199BCB16EBA4DC92AEEB7F8AF15310F54466AF546AF091EF307F49CB50
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 0034884C
                                    • FindFirstFileW.KERNEL32(00000000,?,003A6618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00348905
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0034892D
                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0034893A
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00348A50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                    • String ID:
                                    • API String ID: 1771804793-0
                                    • Opcode ID: a10ea087f5ebeaf846d67b9cd8869c2f7e5d41cbbbd7d45936bccb0745709f5a
                                    • Instruction ID: 4fbd784a770fc7e0516b0413fa81e03cb5b5a17037c53a425e4a6c186947f3f9
                                    • Opcode Fuzzy Hash: a10ea087f5ebeaf846d67b9cd8869c2f7e5d41cbbbd7d45936bccb0745709f5a
                                    • Instruction Fuzzy Hash: DE515372900608AACB06FB64DD56AED7BFCAF15300F504659B8066F192EF34AB49CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: FS9$FS9
                                    • API String ID: 0-155742231
                                    • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                    • Instruction ID: 8bc99c3650350ac39fb386470495abec6d52122b894fb36f0136634ce6c5f607
                                    • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                    • Instruction Fuzzy Hash: DA023D71E002199FDF15DFA9C9816ADFBF5EF88314F2541AAD819EB384D731AE418B80
                                    APIs
                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00347892
                                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0034795A
                                      • Part of subcall function 00344AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFind$FirstNextsend
                                    • String ID: XP;$XP;
                                    • API String ID: 4113138495-291900127
                                    • Opcode ID: abcb18c384340b1493eb4e6cefae9e1f177c1687c005f3834778e224fe372699
                                    • Instruction ID: 54f599cdc44c5242613ce363db034558c1ddefbb0a38669ced63824ba3289546
                                    • Opcode Fuzzy Hash: abcb18c384340b1493eb4e6cefae9e1f177c1687c005f3834778e224fe372699
                                    • Instruction Fuzzy Hash: AB2180321082449BC716FB60DC96DEFB7ECAF95354F800A2DF5965E091EF30BA4E8652
                                    APIs
                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0035CB68
                                      • Part of subcall function 003537AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 003537B9
                                      • Part of subcall function 003537AA: RegSetValueExA.KERNELBASE(?,003A74C8,00000000,?,00000000,00000000,003B52F0,?,?,0034F88E,003A74C8,5.1.3 Pro), ref: 003537E1
                                      • Part of subcall function 003537AA: RegCloseKey.ADVAPI32(?,?,?,0034F88E,003A74C8,5.1.3 Pro), ref: 003537EC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateInfoParametersSystemValue
                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                    • API String ID: 4127273184-3576401099
                                    • Opcode ID: 01387af7de1ec2ea7df8be02892186bdd91c38e14bf40c8f116e913cffa4e65e
                                    • Instruction ID: a2bb6fcf7b96bd76b453681c23403853b5ec88386027121b3ab928a23079cbed
                                    • Opcode Fuzzy Hash: 01387af7de1ec2ea7df8be02892186bdd91c38e14bf40c8f116e913cffa4e65e
                                    • Instruction Fuzzy Hash: 7D113362FD434026D81B31394D6BFAE2D46D347B62F851568FE023E6E6D4C31E5943D2
                                    APIs
                                      • Part of subcall function 00388295: GetLastError.KERNEL32(?,0037F770,0037A875,0037F770,003B4EF8,?,0037CE65,FF8BC35D,003B4EF8,003B4EF8), ref: 00388299
                                      • Part of subcall function 00388295: _free.LIBCMT ref: 003882CC
                                      • Part of subcall function 00388295: SetLastError.KERNEL32(00000000,FF8BC35D,003B4EF8,003B4EF8), ref: 0038830D
                                      • Part of subcall function 00388295: _abort.LIBCMT ref: 00388313
                                    • EnumSystemLocalesW.KERNEL32(00392143,00000001,00000000,?,J8,?,00392770,00000000,?,?,?), ref: 0039208D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                    • String ID: p'9$J8
                                    • API String ID: 1084509184-1146644229
                                    • Opcode ID: 76f6132900495fcc99be5062e4b4c3f72b109df547f831bc9b884e21b1d476f9
                                    • Instruction ID: 6f4506caa29ddf0c76ad2216a58890a2a61bc651118771d0b4a1afe30cfd75f6
                                    • Opcode Fuzzy Hash: 76f6132900495fcc99be5062e4b4c3f72b109df547f831bc9b884e21b1d476f9
                                    • Instruction Fuzzy Hash: 87112936204B016FDF189F39C8916BBB791FF84358B15482DEA4647740D771A943C740
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00358171
                                    • GetProcAddress.KERNEL32(00000000), ref: 00358174
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00358185
                                    • GetProcAddress.KERNEL32(00000000), ref: 00358188
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00358199
                                    • GetProcAddress.KERNEL32(00000000), ref: 0035819C
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 003581AD
                                    • GetProcAddress.KERNEL32(00000000), ref: 003581B0
                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00358252
                                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0035826A
                                    • GetThreadContext.KERNEL32(?,00000000), ref: 00358280
                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 003582A6
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00358328
                                    • TerminateProcess.KERNEL32(?,00000000), ref: 0035833C
                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0035837C
                                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00358446
                                    • SetThreadContext.KERNEL32(?,00000000), ref: 00358463
                                    • ResumeThread.KERNEL32(?), ref: 00358470
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00358487
                                    • GetCurrentProcess.KERNEL32(?), ref: 00358492
                                    • TerminateProcess.KERNEL32(?,00000000), ref: 003584AD
                                    • GetLastError.KERNEL32 ref: 003584B5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                    • API String ID: 4188446516-3035715614
                                    • Opcode ID: 6afcc56019e3ab66c9d484a0950327482341d7e3193b1290dfc4fe97f159cd75
                                    • Instruction ID: 07e5b4a1c0537cd8315ce9f5d97177a36b6b71134eb3d1b541cfbd5833689ad1
                                    • Opcode Fuzzy Hash: 6afcc56019e3ab66c9d484a0950327482341d7e3193b1290dfc4fe97f159cd75
                                    • Instruction Fuzzy Hash: 3DA158B0604305AFEB129F65DC85F6A7BECFB48705F00492EFA95E62A0DB75A804CB11
                                    APIs
                                      • Part of subcall function 0035288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0034F903), ref: 0035289B
                                      • Part of subcall function 0035288B: WaitForSingleObject.KERNEL32(000000FF), ref: 003528AE
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0034D558
                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0034D56B
                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0034D584
                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0034D5B4
                                      • Part of subcall function 0034B8E7: TerminateThread.KERNEL32(0034A2B8,00000000,003B52F0,pth_unenc,0034D0F3,003B52D8,003B52F0,?,pth_unenc), ref: 0034B8F6
                                      • Part of subcall function 0034B8E7: UnhookWindowsHookEx.USER32(003B50F0), ref: 0034B902
                                      • Part of subcall function 0034B8E7: TerminateThread.KERNEL32(0034A2A2,00000000,?,pth_unenc), ref: 0034B910
                                      • Part of subcall function 0035C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,003A6478,00000000,00000000,0034D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0035C4C1
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,003A6478,003A6478,00000000), ref: 0034D7FF
                                    • ExitProcess.KERNEL32 ref: 0034D80B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                    • String ID: """, 0$")$8S;$@q:$@q:$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dM;$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                    • API String ID: 1861856835-1997768807
                                    • Opcode ID: 7080b6b038d11e5a8e4b5b47c4da83cbe43adec9331a1c288307e4d667b9dd8b
                                    • Instruction ID: 164a07ac2e6f576e0c39fcfc73226015bd93e9fa3b8c34d155f49eba1acddad9
                                    • Opcode Fuzzy Hash: 7080b6b038d11e5a8e4b5b47c4da83cbe43adec9331a1c288307e4d667b9dd8b
                                    • Instruction Fuzzy Hash: 9B9185316042005AC717FB24DC92AEFB7E9AF95741F50052DF54A9F1A2EF20BE4EC652
                                    APIs
                                      • Part of subcall function 0035288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0034F903), ref: 0035289B
                                      • Part of subcall function 0035288B: WaitForSingleObject.KERNEL32(000000FF), ref: 003528AE
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,003B52F0,?,pth_unenc), ref: 0034D1E0
                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0034D1F3
                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,003B52F0,?,pth_unenc), ref: 0034D223
                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,003B52F0,?,pth_unenc), ref: 0034D232
                                      • Part of subcall function 0034B8E7: TerminateThread.KERNEL32(0034A2B8,00000000,003B52F0,pth_unenc,0034D0F3,003B52D8,003B52F0,?,pth_unenc), ref: 0034B8F6
                                      • Part of subcall function 0034B8E7: UnhookWindowsHookEx.USER32(003B50F0), ref: 0034B902
                                      • Part of subcall function 0034B8E7: TerminateThread.KERNEL32(0034A2A2,00000000,?,pth_unenc), ref: 0034B910
                                      • Part of subcall function 0035BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,003A6478,0034D248,.vbs,?,?,?,?,?,003B52F0), ref: 0035BA30
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,003A6478,003A6478,00000000), ref: 0034D44D
                                    • ExitProcess.KERNEL32 ref: 0034D454
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                    • String ID: ")$.vbs$8S;$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dM;$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xp:
                                    • API String ID: 3797177996-323333032
                                    • Opcode ID: 3fecc003973f9bcb4f70256dd03a10ccdc25eef8be65d3f335a99c6face29d79
                                    • Instruction ID: 469132cb9efdff25c31360d4d4521e750be33984462016be35fe640f96f2c1aa
                                    • Opcode Fuzzy Hash: 3fecc003973f9bcb4f70256dd03a10ccdc25eef8be65d3f335a99c6face29d79
                                    • Instruction Fuzzy Hash: DD8170316086405BC717FB24DC92EAFB7E8AF95700F10092DF5865F1A2EF60AE4EC652
                                    APIs
                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,003B50E4,00000003), ref: 003524CF
                                    • ExitProcess.KERNEL32(00000000), ref: 003524DB
                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00352555
                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00352564
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0035256F
                                    • CloseHandle.KERNEL32(00000000), ref: 00352576
                                    • GetCurrentProcessId.KERNEL32 ref: 0035257C
                                    • PathFileExistsW.SHLWAPI(?), ref: 003525AD
                                    • GetTempPathW.KERNEL32(00000104,?), ref: 00352610
                                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0035262A
                                    • lstrcatW.KERNEL32(?,.exe), ref: 0035263C
                                      • Part of subcall function 0035C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,003A6478,00000000,00000000,0034D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0035C4C1
                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0035267C
                                    • Sleep.KERNEL32(000001F4), ref: 003526BD
                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 003526D2
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 003526DD
                                    • CloseHandle.KERNEL32(00000000), ref: 003526E4
                                    • GetCurrentProcessId.KERNEL32 ref: 003526EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                    • String ID: .exe$8S;$WDH$exepath$open$temp_
                                    • API String ID: 2649220323-107866890
                                    • Opcode ID: 57375ef62bb70d41aed6a54be7312850648913f14fcb5766a4cabc23f157300c
                                    • Instruction ID: 60f674eee7e5046dcc5c8233a74363b88cfaee9527ef3b7dbc56e44942d8d776
                                    • Opcode Fuzzy Hash: 57375ef62bb70d41aed6a54be7312850648913f14fcb5766a4cabc23f157300c
                                    • Instruction Fuzzy Hash: 3B510471A002096BDF03A7A49C9AFFE33ACDB09741F01015AF902AB1E1EF755E498B64
                                    APIs
                                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0035B1CD
                                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0035B1E1
                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,003A60B4), ref: 0035B209
                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,003B4EE0,00000000), ref: 0035B21F
                                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0035B260
                                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0035B278
                                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0035B28D
                                    • SetEvent.KERNEL32 ref: 0035B2AA
                                    • WaitForSingleObject.KERNEL32(000001F4), ref: 0035B2BB
                                    • CloseHandle.KERNEL32 ref: 0035B2CB
                                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0035B2ED
                                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0035B2F7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$N;
                                    • API String ID: 738084811-627243502
                                    • Opcode ID: e11a43027ab62708898ea3fec1471ef3f2536888fd68cfb0068a0bfe274f8a8a
                                    • Instruction ID: e336e8ff0dcd1fefdd47193855f55ab5c16af8f7bf3f87b2fd97ed694fbc15bc
                                    • Opcode Fuzzy Hash: e11a43027ab62708898ea3fec1471ef3f2536888fd68cfb0068a0bfe274f8a8a
                                    • Instruction Fuzzy Hash: A051B3712442046ED217B730DC92EBFBBDCEB81359F00062EF5465E5A2EF206D0D8766
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00341AD9
                                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00341B03
                                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00341B13
                                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00341B23
                                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00341B33
                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00341B43
                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00341B54
                                    • WriteFile.KERNEL32(00000000,003B2AAA,00000002,00000000,00000000), ref: 00341B65
                                    • WriteFile.KERNEL32(00000000,003B2AAC,00000004,00000000,00000000), ref: 00341B75
                                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00341B85
                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00341B96
                                    • WriteFile.KERNEL32(00000000,003B2AB6,00000002,00000000,00000000), ref: 00341BA7
                                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00341BB7
                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00341BC7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Write$Create
                                    • String ID: RIFF$WAVE$data$fmt
                                    • API String ID: 1602526932-4212202414
                                    • Opcode ID: 61f6af24aff7f62ba9b13558e324086bff4397777646e0fafe3cccd5c4a05357
                                    • Instruction ID: 27c17cb65360fdfd72c8d55d1cefb4fc4ba4d1720da28a13f0c6643d53202708
                                    • Opcode Fuzzy Hash: 61f6af24aff7f62ba9b13558e324086bff4397777646e0fafe3cccd5c4a05357
                                    • Instruction Fuzzy Hash: 59416C726442087AE211DE51DC86FBB7FECEB8AF54F40051AF644D6080DBA1A909DBB3
                                    APIs
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,c:\program files (x86)\internet explorer\iexplore.exe,00000001,00347688,c:\program files (x86)\internet explorer\iexplore.exe,00000003,003476B0,003B52D8,00347709), ref: 003472BF
                                    • GetProcAddress.KERNEL32(00000000), ref: 003472C8
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 003472DD
                                    • GetProcAddress.KERNEL32(00000000), ref: 003472E0
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 003472F1
                                    • GetProcAddress.KERNEL32(00000000), ref: 003472F4
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00347305
                                    • GetProcAddress.KERNEL32(00000000), ref: 00347308
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00347319
                                    • GetProcAddress.KERNEL32(00000000), ref: 0034731C
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0034732D
                                    • GetProcAddress.KERNEL32(00000000), ref: 00347330
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$c:\program files (x86)\internet explorer\iexplore.exe$ntdll.dll
                                    • API String ID: 1646373207-4049906730
                                    • Opcode ID: 43ccd139e26205684b6654c0fb2146421b0d6f6e8bd0788fe2a13c0e8bc79cb8
                                    • Instruction ID: fe13d53fd14b6fca8fe2dc2c887c86f8640f8c9785edf094113ce5a90a4b997a
                                    • Opcode Fuzzy Hash: 43ccd139e26205684b6654c0fb2146421b0d6f6e8bd0788fe2a13c0e8bc79cb8
                                    • Instruction Fuzzy Hash: D6017CA0F4431A6A8B136B7BAC56D5B6FDDDE413547090E2BF501E2192EFB8E800CE60
                                    APIs
                                    • lstrlenW.KERNEL32(?), ref: 0035C0C7
                                    • _memcmp.LIBVCRUNTIME ref: 0035C0DF
                                    • lstrlenW.KERNEL32(?), ref: 0035C0F8
                                    • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0035C133
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0035C146
                                    • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0035C18A
                                    • lstrcmpW.KERNEL32(?,?), ref: 0035C1A5
                                    • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0035C1BD
                                    • _wcslen.LIBCMT ref: 0035C1CC
                                    • FindVolumeClose.KERNEL32(?), ref: 0035C1EC
                                    • GetLastError.KERNEL32 ref: 0035C204
                                    • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0035C231
                                    • lstrcatW.KERNEL32(?,?), ref: 0035C24A
                                    • lstrcpyW.KERNEL32(?,?), ref: 0035C259
                                    • GetLastError.KERNEL32 ref: 0035C261
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                    • String ID: ?
                                    • API String ID: 3941738427-1684325040
                                    • Opcode ID: da60a829f3f94f8ad5936ebd611c15f0cc12f62b0eaad5e911858923c3a52a10
                                    • Instruction ID: d858a66560a7ecea36fe5350c351b51717bb0813a072961b3a0d55860ff1f4ba
                                    • Opcode Fuzzy Hash: da60a829f3f94f8ad5936ebd611c15f0cc12f62b0eaad5e911858923c3a52a10
                                    • Instruction Fuzzy Hash: 5A4192715183069FDB22EF64D848E9BB7ECFB84345F01192BF945D2171EB72CA488792
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$EnvironmentVariable$_wcschr
                                    • String ID:
                                    • API String ID: 3899193279-0
                                    • Opcode ID: 8eb81568dbe575019e14bb1934e13099fdb5f40858350b2331637d10a3bfb800
                                    • Instruction ID: 24830dae64044bfaf3971d04199ce7569d11d239f2ae8037845597c2c344262f
                                    • Opcode Fuzzy Hash: 8eb81568dbe575019e14bb1934e13099fdb5f40858350b2331637d10a3bfb800
                                    • Instruction Fuzzy Hash: 1DD147B19007046FEB27BF789C82B6A77A8EF02364F1642FDF945AB281E73599018750
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00352B08
                                      • Part of subcall function 0035BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,003A6478,0034D248,.vbs,?,?,?,?,?,003B52F0), ref: 0035BA30
                                      • Part of subcall function 003585A3: CloseHandle.KERNEL32(003440F5,?,?,003440F5,003A5E84), ref: 003585B9
                                      • Part of subcall function 003585A3: CloseHandle.KERNEL32(003A5E84,?,?,003440F5,003A5E84), ref: 003585C2
                                    • Sleep.KERNEL32(0000000A,003A5E84), ref: 00352C5A
                                    • Sleep.KERNEL32(0000000A,003A5E84,003A5E84), ref: 00352CFC
                                    • Sleep.KERNEL32(0000000A,003A5E84,003A5E84,003A5E84), ref: 00352D9E
                                    • DeleteFileW.KERNEL32(00000000,003A5E84,003A5E84,003A5E84), ref: 00352E00
                                    • DeleteFileW.KERNEL32(00000000,003A5E84,003A5E84,003A5E84), ref: 00352E37
                                    • DeleteFileW.KERNEL32(00000000,003A5E84,003A5E84,003A5E84), ref: 00352E73
                                    • Sleep.KERNEL32(000001F4,003A5E84,003A5E84,003A5E84), ref: 00352E8D
                                    • Sleep.KERNEL32(00000064), ref: 00352ECF
                                      • Part of subcall function 00344AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                    • String ID: /stext "$0T;$0T;$N;$N;
                                    • API String ID: 1223786279-974270601
                                    • Opcode ID: e9c341417e551bcebdfb3c757858072633e6062573e728b4fa677d145ddceba7
                                    • Instruction ID: 969eb81ede8bbc9847060933906b2d4ca73268d445d08121662d906fe486d91e
                                    • Opcode Fuzzy Hash: e9c341417e551bcebdfb3c757858072633e6062573e728b4fa677d145ddceba7
                                    • Instruction Fuzzy Hash: FE0216315087404AC326FB61D891BEFB7E5AF95301F90492DF58A4F1A2EF707A8EC652
                                    APIs
                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0035C742
                                    • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0035C786
                                    • RegCloseKey.ADVAPI32(?), ref: 0035CA50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEnumOpen
                                    • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                    • API String ID: 1332880857-3714951968
                                    • Opcode ID: 6b0bcb40739578332ebbfa5190e40e8b24e7f5966d5a4e8158c5aa386d937e52
                                    • Instruction ID: b4cb253a4de2b2bf455cf15a1438b6ddd4acb7ff0209e895a61198218954cf4a
                                    • Opcode Fuzzy Hash: 6b0bcb40739578332ebbfa5190e40e8b24e7f5966d5a4e8158c5aa386d937e52
                                    • Instruction Fuzzy Hash: F7811F311183459BD326EB10D851EEFB7E8FF95305F10492EB58A8B161FF31AA4DCA92
                                    APIs
                                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0035D66B
                                    • GetCursorPos.USER32(?), ref: 0035D67A
                                    • SetForegroundWindow.USER32(?), ref: 0035D683
                                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0035D69D
                                    • Shell_NotifyIconA.SHELL32(00000002,003B4B48), ref: 0035D6EE
                                    • ExitProcess.KERNEL32 ref: 0035D6F6
                                    • CreatePopupMenu.USER32 ref: 0035D6FC
                                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0035D711
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                    • String ID: Close
                                    • API String ID: 1657328048-3535843008
                                    • Opcode ID: 8d6602d4162777e760858f57885ffc8cd2e93c782b077a21bb8108a1b59dba23
                                    • Instruction ID: 76512649cc548bccf680825f12c49a29eb0e4aef575bfea188e9349d69c976e7
                                    • Opcode Fuzzy Hash: 8d6602d4162777e760858f57885ffc8cd2e93c782b077a21bb8108a1b59dba23
                                    • Instruction Fuzzy Hash: 5F21EB75100109EFDB2B9FA8ED4EFA93F7DEB08302F01021AFA45950B1D7B29925DB54
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00348D1E
                                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00348D56
                                    • __aulldiv.LIBCMT ref: 00348D88
                                      • Part of subcall function 00344AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                      • Part of subcall function 0035B580: GetLocalTime.KERNEL32(00000000), ref: 0035B59A
                                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00348EAB
                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00348EC6
                                    • CloseHandle.KERNEL32(00000000), ref: 00348F9F
                                    • CloseHandle.KERNEL32(00000000,00000052), ref: 00348FE9
                                    • CloseHandle.KERNEL32(00000000), ref: 00349037
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $N;
                                    • API String ID: 3086580692-3225940200
                                    • Opcode ID: 770a2881844c7370c7e6069d0bc9267ff5e3cd67021dfb6e170d31c0da953138
                                    • Instruction ID: e0d372a8291a0b7fc4217ab9b1b8467fa977fda7d354889491ebb0357aab0a02
                                    • Opcode Fuzzy Hash: 770a2881844c7370c7e6069d0bc9267ff5e3cd67021dfb6e170d31c0da953138
                                    • Instruction Fuzzy Hash: B0B17F316083409BC716FB24D892AAFB7E5EF84310F40492EF58A5F291EF71AD49CB56
                                    APIs
                                    • Sleep.KERNEL32(00001388), ref: 0034A77B
                                      • Part of subcall function 0034A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0034A788), ref: 0034A6E6
                                      • Part of subcall function 0034A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0034A788), ref: 0034A6F5
                                      • Part of subcall function 0034A6B0: Sleep.KERNEL32(00002710,?,?,?,0034A788), ref: 0034A722
                                      • Part of subcall function 0034A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0034A788), ref: 0034A729
                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0034A7B7
                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0034A7C8
                                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0034A7DF
                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0034A859
                                      • Part of subcall function 0035C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0034A87E), ref: 0035C52F
                                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,003A6478,?,00000000,00000000,00000000,00000000,00000000), ref: 0034A962
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                    • String ID: 8S;$8S;$pQ;$pQ;$P;$P;
                                    • API String ID: 3795512280-2086096373
                                    • Opcode ID: 06383ebd9cf5209758ac02d22241762661363bca25e28a9a77a6320b8f9412f1
                                    • Instruction ID: 9f851a72abcdfecde2dd511ad119b50f5e555c0398e6fdc8cce35d1b2118d7f5
                                    • Opcode Fuzzy Hash: 06383ebd9cf5209758ac02d22241762661363bca25e28a9a77a6320b8f9412f1
                                    • Instruction Fuzzy Hash: 4A51B071244A041ACB17BB74C866ABF77E99F81304F400A2DF582AF1E3DF24794A8652
                                    APIs
                                    • ___free_lconv_mon.LIBCMT ref: 0039138A
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 0039059F
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 003905B1
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 003905C3
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 003905D5
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 003905E7
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 003905F9
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 0039060B
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 0039061D
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 0039062F
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 00390641
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 00390653
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 00390665
                                      • Part of subcall function 00390582: _free.LIBCMT ref: 00390677
                                    • _free.LIBCMT ref: 0039137F
                                      • Part of subcall function 00386802: HeapFree.KERNEL32(00000000,00000000,?,00390CEF,?,00000000,?,00000000,?,00390F93,?,00000007,?,?,003914DE,?), ref: 00386818
                                      • Part of subcall function 00386802: GetLastError.KERNEL32(?,?,00390CEF,?,00000000,?,00000000,?,00390F93,?,00000007,?,?,003914DE,?,?), ref: 0038682A
                                    • _free.LIBCMT ref: 003913A1
                                    • _free.LIBCMT ref: 003913B6
                                    • _free.LIBCMT ref: 003913C1
                                    • _free.LIBCMT ref: 003913E3
                                    • _free.LIBCMT ref: 003913F6
                                    • _free.LIBCMT ref: 00391404
                                    • _free.LIBCMT ref: 0039140F
                                    • _free.LIBCMT ref: 00391447
                                    • _free.LIBCMT ref: 0039144E
                                    • _free.LIBCMT ref: 0039146B
                                    • _free.LIBCMT ref: 00391483
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                    • String ID:
                                    • API String ID: 161543041-0
                                    • Opcode ID: dfd0546352352a080f940458ae987296ed4179ff46a981fda90204775e306797
                                    • Instruction ID: 131a3e9e5cc13f6730fcf1072df47a5a51200a4d05fa6f0154df62f877693ded
                                    • Opcode Fuzzy Hash: dfd0546352352a080f940458ae987296ed4179ff46a981fda90204775e306797
                                    • Instruction Fuzzy Hash: DB316F716007029FDF22AA39D847B6A73F8EF05310F618969E499EB551DF74ED40C711
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 0035A04A
                                    • GdiplusStartup.GDIPLUS(003B4ACC,?,00000000), ref: 0035A07C
                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0035A108
                                    • Sleep.KERNEL32(000003E8), ref: 0035A18E
                                    • GetLocalTime.KERNEL32(?), ref: 0035A196
                                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0035A285
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                    • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$P;$P;$P;
                                    • API String ID: 489098229-124128395
                                    • Opcode ID: 9e1d3f40cc7320402cf1b3fb548b880321fcbddc160282bc7a519b6a4ba135b3
                                    • Instruction ID: b81c303385e032e6f0ff60b173c661229ac3cff76e4c475140062abb50f923a7
                                    • Opcode Fuzzy Hash: 9e1d3f40cc7320402cf1b3fb548b880321fcbddc160282bc7a519b6a4ba135b3
                                    • Instruction Fuzzy Hash: CD518130E006589ACB17FBB4CC52AFDBBB9AF55301F440129F945AF1A2EF246E89C751
                                    APIs
                                      • Part of subcall function 0035288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0034F903), ref: 0035289B
                                      • Part of subcall function 0035288B: WaitForSingleObject.KERNEL32(000000FF), ref: 003528AE
                                      • Part of subcall function 00353733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,003B52F0), ref: 0035374F
                                      • Part of subcall function 00353733: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00353768
                                      • Part of subcall function 00353733: RegCloseKey.ADVAPI32(00000000), ref: 00353773
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0034D894
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,003A6478,003A6478,00000000), ref: 0034D9F3
                                    • ExitProcess.KERNEL32 ref: 0034D9FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                    • String ID: """, 0$.vbs$8S;$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                    • API String ID: 1913171305-1559446776
                                    • Opcode ID: 13f4150dd12c2487b6bc658f5badebb04c173f29b8788073152b449ab57095e5
                                    • Instruction ID: 4d4f5faabef9c7b787a22b29e4d4849a027e34f8abb9cef0b5dc1d2bf21818c8
                                    • Opcode Fuzzy Hash: 13f4150dd12c2487b6bc658f5badebb04c173f29b8788073152b449ab57095e5
                                    • Instruction Fuzzy Hash: DE413E319005185ADB17FB64DC96EEEB7B8AF51701F500269F506AF092FF207E8ACA90
                                    APIs
                                    • connect.WS2_32(?,?,?), ref: 003448E0
                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00344A00
                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00344A0E
                                    • WSAGetLastError.WS2_32 ref: 00344A21
                                      • Part of subcall function 0035B580: GetLocalTime.KERNEL32(00000000), ref: 0035B59A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                    • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                    • API String ID: 994465650-2151626615
                                    • Opcode ID: 2a8d700e45f6a36d6df2615b1574daeb0ef524b0b8a55af1e5ca50a2d455069e
                                    • Instruction ID: d95605863e5b387a975e6f4440cbc78b92a2efd0ef500722e66fd11ad642e7cc
                                    • Opcode Fuzzy Hash: 2a8d700e45f6a36d6df2615b1574daeb0ef524b0b8a55af1e5ca50a2d455069e
                                    • Instruction Fuzzy Hash: 9441FC65B40605BBD717777A890796EFAD9EB42304B800529F8024FAA7EF21FC148BD3
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: c3475ba1402d298a24aaeee22df9838b294e259fb94b0b506d9daa1b81864d61
                                    • Instruction ID: c7006fad0af2ebc0c0efa2294f5e1d4268d8a813b0ff1165642f2b8f459f4540
                                    • Opcode Fuzzy Hash: c3475ba1402d298a24aaeee22df9838b294e259fb94b0b506d9daa1b81864d61
                                    • Instruction Fuzzy Hash: D0C13172D40604BFEF25DBA8CC83FEE77B8AB08740F154165FA48EB282D6B09D459754
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,003B50E4,?,003B5338), ref: 0034F4C9
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,003B5338), ref: 0034F4F4
                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0034F510
                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0034F58F
                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,003B5338), ref: 0034F59E
                                      • Part of subcall function 0035C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0035C286
                                      • Part of subcall function 0035C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0035C299
                                    • CloseHandle.KERNEL32(00000000,?,003B5338), ref: 0034F6A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                    • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                    • API String ID: 3756808967-1743721670
                                    • Opcode ID: 2dfac3e6150e0aec7183f313ee7a93de79f49b9ed8f25037f3ebb0eed5f0b217
                                    • Instruction ID: 2efa1d33d7dd294009ebac94e6ab3ec686425919b816f55750889a538ccd8193
                                    • Opcode Fuzzy Hash: 2dfac3e6150e0aec7183f313ee7a93de79f49b9ed8f25037f3ebb0eed5f0b217
                                    • Instruction Fuzzy Hash: 32712D305083419FD756EB20D891EAEBBE8AF91340F40092DF5864F1A2EF35A94ECB52
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 0$1$2$3$4$5$6$7$V;
                                    • API String ID: 0-927629817
                                    • Opcode ID: 9a348b702038fdf1055e8c8b4b9117ef4c8cfab7e0b99de4912c8a4bae67dfa0
                                    • Instruction ID: 221dff317f9854ca0ab5a987a56022d40b9173fa3026c294257f5d4f11a7bdf1
                                    • Opcode Fuzzy Hash: 9a348b702038fdf1055e8c8b4b9117ef4c8cfab7e0b99de4912c8a4bae67dfa0
                                    • Instruction Fuzzy Hash: 9571B1709483019FDB06EF20D892FAA7BD49F95710F10491EF9965F2E2DA70AB0DC792
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID: \&;$\&;$`&;
                                    • API String ID: 269201875-2082195981
                                    • Opcode ID: 6949ffc70a9a6238c4d0d8da18e29a4ca1cf66988001f485accc9cf69c7cfe57
                                    • Instruction ID: 228c82434bfc70a3188c365370bf0a2982cf82d5680db4e54e86a04adae4b254
                                    • Opcode Fuzzy Hash: 6949ffc70a9a6238c4d0d8da18e29a4ca1cf66988001f485accc9cf69c7cfe57
                                    • Instruction Fuzzy Hash: 34619E72900305AFDF26DF68C842B9EBBF8EF05710F2542A9E958EF241E7709D419B90
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00341D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0037A912
                                    • GetLastError.KERNEL32(?,?,00341D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0037A91F
                                    • __dosmaperr.LIBCMT ref: 0037A926
                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00341D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0037A952
                                    • GetLastError.KERNEL32(?,?,?,00341D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0037A95C
                                    • __dosmaperr.LIBCMT ref: 0037A963
                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00341D55,?), ref: 0037A9A6
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00341D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0037A9B0
                                    • __dosmaperr.LIBCMT ref: 0037A9B7
                                    • _free.LIBCMT ref: 0037A9C3
                                    • _free.LIBCMT ref: 0037A9CA
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                    • String ID:
                                    • API String ID: 2441525078-0
                                    • Opcode ID: 2dea641a93c722c925d026041e41abe84e49981f5e1ebd8e9042c3301b2dd466
                                    • Instruction ID: c45a4947507ab3f866ccd4af8180957cb9a6ee5b767a85cc080b8369b8e804d2
                                    • Opcode Fuzzy Hash: 2dea641a93c722c925d026041e41abe84e49981f5e1ebd8e9042c3301b2dd466
                                    • Instruction Fuzzy Hash: EC31A372904A0EBBDF23AFA8CC45DAE3B6CAF46320B11815AF9145A151DB398D50DB62
                                    APIs
                                    • SetEvent.KERNEL32(?,?), ref: 003454BF
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0034556F
                                    • TranslateMessage.USER32(?), ref: 0034557E
                                    • DispatchMessageA.USER32(?), ref: 00345589
                                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,003B4F78), ref: 00345641
                                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00345679
                                      • Part of subcall function 00344AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                    • String ID: CloseChat$DisplayMessage$GetMessage
                                    • API String ID: 2956720200-749203953
                                    • Opcode ID: b806ae01e7ad37f699bd5d907a199f864cb82b1ddc99f29a4d929f0ae96f06e9
                                    • Instruction ID: a53315dd0dbfcbfd76bee699b942568573c8a0afc3e37eec1fff2b8e67d9152e
                                    • Opcode Fuzzy Hash: b806ae01e7ad37f699bd5d907a199f864cb82b1ddc99f29a4d929f0ae96f06e9
                                    • Instruction Fuzzy Hash: 5841C335A04600ABCB16FB74DC5A96F77E9AF85700F400A2DF9529F1A2DF34A909C792
                                    APIs
                                    • OpenClipboard.USER32 ref: 0035697C
                                    • EmptyClipboard.USER32 ref: 0035698A
                                    • CloseClipboard.USER32 ref: 00356990
                                    • OpenClipboard.USER32 ref: 00356997
                                    • GetClipboardData.USER32(0000000D), ref: 003569A7
                                    • GlobalLock.KERNEL32(00000000), ref: 003569B0
                                    • GlobalUnlock.KERNEL32(00000000), ref: 003569B9
                                    • CloseClipboard.USER32 ref: 003569BF
                                      • Part of subcall function 00344AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                    • String ID: !D4
                                    • API String ID: 2172192267-1936690033
                                    • Opcode ID: bbef7fd0f0a4d1375ffbec9396706a8b9d6de56cb6fbcfacd0b320f03ded8968
                                    • Instruction ID: b7d550841dd55968b4e522bd9be420e2232181a8584a87d87ab25e8984eaee69
                                    • Opcode Fuzzy Hash: bbef7fd0f0a4d1375ffbec9396706a8b9d6de56cb6fbcfacd0b320f03ded8968
                                    • Instruction Fuzzy Hash: E70148352046009FD716BF79EC99BAEB7E9AF84702F40056FF9068A1E1DF2298498661
                                    APIs
                                    • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00353452
                                    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00353460
                                    • GetFileSize.KERNEL32(?,00000000), ref: 0035346D
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0035348D
                                    • CloseHandle.KERNEL32(00000000), ref: 0035349A
                                    • CloseHandle.KERNEL32(?), ref: 003534A0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                    • String ID:
                                    • API String ID: 297527592-0
                                    • Opcode ID: 972ebe09879220b3367daa55ec7d15e51568d64a5c742b6025147e20a84286fc
                                    • Instruction ID: 05a7e44a685d72c6e63d5e87d6e6cee17c1959a12a65feed3765c5ca6477ea30
                                    • Opcode Fuzzy Hash: 972ebe09879220b3367daa55ec7d15e51568d64a5c742b6025147e20a84286fc
                                    • Instruction Fuzzy Hash: 02412771508301BFD7239F29DC4AF2B7BACEF857A5F10461EFA45D60A1DB35CA048662
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0035A517,00000000), ref: 0035ABAD
                                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0035A517,00000000), ref: 0035ABC4
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0035A517,00000000), ref: 0035ABD1
                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0035A517,00000000), ref: 0035ABE0
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0035A517,00000000), ref: 0035ABF1
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0035A517,00000000), ref: 0035ABF4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ControlManager
                                    • String ID:
                                    • API String ID: 221034970-0
                                    • Opcode ID: e8d3b45c5253dd8a504cc8cf493ff15232619ad4769433814e51a3bbd95ae5d0
                                    • Instruction ID: 9162069f8c58715fa69ee147982c4e3e4d27539401a4ade45628e280a2f412a6
                                    • Opcode Fuzzy Hash: e8d3b45c5253dd8a504cc8cf493ff15232619ad4769433814e51a3bbd95ae5d0
                                    • Instruction Fuzzy Hash: 9A11E9715005187F9722AB68ECC5EFF3B6CDF46362F00011BFD1696250DB254D4AAAF1
                                    APIs
                                    • _free.LIBCMT ref: 003881B5
                                      • Part of subcall function 00386802: HeapFree.KERNEL32(00000000,00000000,?,00390CEF,?,00000000,?,00000000,?,00390F93,?,00000007,?,?,003914DE,?), ref: 00386818
                                      • Part of subcall function 00386802: GetLastError.KERNEL32(?,?,00390CEF,?,00000000,?,00000000,?,00390F93,?,00000007,?,?,003914DE,?,?), ref: 0038682A
                                    • _free.LIBCMT ref: 003881C1
                                    • _free.LIBCMT ref: 003881CC
                                    • _free.LIBCMT ref: 003881D7
                                    • _free.LIBCMT ref: 003881E2
                                    • _free.LIBCMT ref: 003881ED
                                    • _free.LIBCMT ref: 003881F8
                                    • _free.LIBCMT ref: 00388203
                                    • _free.LIBCMT ref: 0038820E
                                    • _free.LIBCMT ref: 0038821C
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 58654aa8f3d9afee10e34f41eacf4750526fe6591fd50a368bb2345c9adb19cc
                                    • Instruction ID: beea913e0c2705ad662a55a5b674436fe5acd18c044e9ef9b1a8c8d3c63a02bd
                                    • Opcode Fuzzy Hash: 58654aa8f3d9afee10e34f41eacf4750526fe6591fd50a368bb2345c9adb19cc
                                    • Instruction Fuzzy Hash: 0D1142B6910708BFCB02FF94C953CD93BA5FF04350B5145A5FA488F222DB72EA549B82
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Eventinet_ntoa
                                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$N;
                                    • API String ID: 3578746661-2406003630
                                    • Opcode ID: c605a6171e61beb6f1ef0d4a67e3a7cb25851768ee30864be884c100ec0076fe
                                    • Instruction ID: 4465e2f436f4c23dd5b6606be5280e39d22fa1213b5885ecd21d705a8af7bdae
                                    • Opcode Fuzzy Hash: c605a6171e61beb6f1ef0d4a67e3a7cb25851768ee30864be884c100ec0076fe
                                    • Instruction Fuzzy Hash: 0B51AF31A042005BC717FB38D85AB6E76E9AB85701F80072DFD529F6B2DF64994DC782
                                    APIs
                                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00357530
                                      • Part of subcall function 0035C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0034A87E), ref: 0035C52F
                                    • Sleep.KERNEL32(00000064), ref: 0035755C
                                    • DeleteFileW.KERNEL32(00000000), ref: 00357590
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CreateDeleteExecuteShellSleep
                                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                    • API String ID: 1462127192-2001430897
                                    • Opcode ID: cde0c71813f50ba81d7105b3815af7c8c66c9471264ec8c0e14f8a424a999e8d
                                    • Instruction ID: afa446d9ae04a4f54671727daa5c386e952c482f9e04204f6ad986f23362ce02
                                    • Opcode Fuzzy Hash: cde0c71813f50ba81d7105b3815af7c8c66c9471264ec8c0e14f8a424a999e8d
                                    • Instruction Fuzzy Hash: F03141319501185ADB06FBA0DC96EEDB7B8EF10301F400569F5066F0E2EF217E8ECA95
                                    APIs
                                    • GetCurrentProcess.KERNEL32(003B2B14,00000000,003B52D8,00003000,00000004,00000000,00000001), ref: 00347418
                                    • GetCurrentProcess.KERNEL32(003B2B14,00000000,00008000,?,00000000,00000001,00000000,00347691,c:\program files (x86)\internet explorer\iexplore.exe), ref: 003474D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CurrentProcess
                                    • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                    • API String ID: 2050909247-4242073005
                                    • Opcode ID: da18de0fbf8759b6c0f3a9d155a3a79b7bc2e73e2bc321231a30e466293e511a
                                    • Instruction ID: 91d0be6f7e7e17712e76b02a096acbc03ee06713175cd7a0cf31615f99ac82fe
                                    • Opcode Fuzzy Hash: da18de0fbf8759b6c0f3a9d155a3a79b7bc2e73e2bc321231a30e466293e511a
                                    • Instruction Fuzzy Hash: F4316E71314301AFD717EF65DC46F6777ACFB4571AF040B18F602AA6A1DBB4A8018B61
                                    APIs
                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00341BF9
                                    • waveInOpen.WINMM(003B2AC0,000000FF,003B2AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00341C8F
                                    • waveInPrepareHeader.WINMM(003B2A88,00000020), ref: 00341CE3
                                    • waveInAddBuffer.WINMM(003B2A88,00000020), ref: 00341CF2
                                    • waveInStart.WINMM ref: 00341CFE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                    • String ID: dM;$|M;$P;
                                    • API String ID: 1356121797-2583341346
                                    • Opcode ID: 258f0d993e8f61851af965347f5a16c9486457529381f0f2146c010634922ff1
                                    • Instruction ID: 693b55d8754df6f2442bcda6fe888d65c13df2413f875ae002e9ef73d1fca256
                                    • Opcode Fuzzy Hash: 258f0d993e8f61851af965347f5a16c9486457529381f0f2146c010634922ff1
                                    • Instruction Fuzzy Hash: C9212A716146009EC727DF6AAC096577BADBB95718F00472EB305DAAB1DF344441CB18
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0035D507
                                      • Part of subcall function 0035D5A0: RegisterClassExA.USER32(00000030), ref: 0035D5EC
                                      • Part of subcall function 0035D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0035D607
                                      • Part of subcall function 0035D5A0: GetLastError.KERNEL32 ref: 0035D611
                                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0035D53E
                                    • lstrcpynA.KERNEL32(003B4B60,Remcos,00000080), ref: 0035D558
                                    • Shell_NotifyIconA.SHELL32(00000000,003B4B48), ref: 0035D56E
                                    • TranslateMessage.USER32(?), ref: 0035D57A
                                    • DispatchMessageA.USER32(?), ref: 0035D584
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0035D591
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                    • String ID: Remcos
                                    • API String ID: 1970332568-165870891
                                    • Opcode ID: 2f599b32872c7d8ae3d8b0628fb8a66df68f518f02ca729f96a9de7b417dbeaf
                                    • Instruction ID: f0e0f3563c49336bbffb692626fd4fc3766feb25d73e918d9f7668e921dfdb20
                                    • Opcode Fuzzy Hash: 2f599b32872c7d8ae3d8b0628fb8a66df68f518f02ca729f96a9de7b417dbeaf
                                    • Instruction Fuzzy Hash: 60015E71800248ABDB22DFA5EC4DFDABBBCFB85709F00411BF751930A1D7B580448B54
                                    APIs
                                      • Part of subcall function 00388295: GetLastError.KERNEL32(?,0037F770,0037A875,0037F770,003B4EF8,?,0037CE65,FF8BC35D,003B4EF8,003B4EF8), ref: 00388299
                                      • Part of subcall function 00388295: _free.LIBCMT ref: 003882CC
                                      • Part of subcall function 00388295: SetLastError.KERNEL32(00000000,FF8BC35D,003B4EF8,003B4EF8), ref: 0038830D
                                      • Part of subcall function 00388295: _abort.LIBCMT ref: 00388313
                                    • _memcmp.LIBVCRUNTIME ref: 003854A4
                                    • _free.LIBCMT ref: 00385515
                                    • _free.LIBCMT ref: 0038552E
                                    • _free.LIBCMT ref: 00385560
                                    • _free.LIBCMT ref: 00385569
                                    • _free.LIBCMT ref: 00385575
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorLast$_abort_memcmp
                                    • String ID: C
                                    • API String ID: 1679612858-1037565863
                                    • Opcode ID: 187fa5675be8c23bded0d9da8e35eca4d2441bf8269059cb1dc058857401f8a8
                                    • Instruction ID: 741eea74ff18dff504ac8f41682eafee5ac8e1d98ea7d29ee4cf938b603e6663
                                    • Opcode Fuzzy Hash: 187fa5675be8c23bded0d9da8e35eca4d2441bf8269059cb1dc058857401f8a8
                                    • Instruction Fuzzy Hash: D0B139759017199FDB26EF18C885BADB7B4FB08304F5145EAE909A7350EB71AE90CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: tcp$udp
                                    • API String ID: 0-3725065008
                                    • Opcode ID: 77c960b48eb602f2d6d52fe59223aa8b9de03fd6f742ce714df0bdeb66bb486a
                                    • Instruction ID: eaae3165fd10c79e97f61f6aeb68b720d61d7a4f7377e77204a03274a7b6ef8e
                                    • Opcode Fuzzy Hash: 77c960b48eb602f2d6d52fe59223aa8b9de03fd6f742ce714df0bdeb66bb486a
                                    • Instruction Fuzzy Hash: F3716B34A083428FD72E8E558445B2AB7E4EB9434AF16446EFC8687261E774CD88CB92
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 003418BE
                                    • ExitThread.KERNEL32 ref: 003418F6
                                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,003B4EE0,00000000), ref: 00341A04
                                      • Part of subcall function 00374801: __onexit.LIBCMT ref: 00374807
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                    • String ID: Pk;$XM;$N;$N;
                                    • API String ID: 1649129571-407576166
                                    • Opcode ID: fd870ad9281e08b43b9345454d50034cb4e5cf23717ae9ea01b015d687acf622
                                    • Instruction ID: 617170475c897cca65ba4248ee13de4087c96e1e745319beb6a793314f56872d
                                    • Opcode Fuzzy Hash: fd870ad9281e08b43b9345454d50034cb4e5cf23717ae9ea01b015d687acf622
                                    • Instruction Fuzzy Hash: CC4180321046009BC72BFB25DC96ABF73E9AB94314F80062DF5469E1E2DF31798AC716
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,003B4EE0,003A5FB4,?,00000000,00348037,00000000), ref: 00347A00
                                    • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00348037,00000000,?,?,0000000A,00000000), ref: 00347A48
                                      • Part of subcall function 00344AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00348037,00000000,?,?,0000000A,00000000), ref: 00347A88
                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00347AA5
                                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00347AD0
                                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00347AE0
                                      • Part of subcall function 00344B96: WaitForSingleObject.KERNEL32(?,000000FF,00000000,003B4EF8,00344C49,00000000,?,?,00000000,003B4EF8,00344AC9), ref: 00344BA5
                                      • Part of subcall function 00344B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0034548B), ref: 00344BC3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                    • String ID: .part
                                    • API String ID: 1303771098-3499674018
                                    • Opcode ID: 1aae83b3f5a6bc434c84945c159a4fe02c703f4e05f00860eeb8fc33f1289108
                                    • Instruction ID: a370990beb9304fec42b85d73bc1a17011ec2e8264b6cef6199dc2f997f709c1
                                    • Opcode Fuzzy Hash: 1aae83b3f5a6bc434c84945c159a4fe02c703f4e05f00860eeb8fc33f1289108
                                    • Instruction Fuzzy Hash: 6E31AE71508344AFC312EF64D885AAFB7ECFF94315F004A1EB5869A151EB70AA48CB92
                                    APIs
                                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0034A30E
                                    • SetWindowsHookExA.USER32(0000000D,0034A2DF,00000000), ref: 0034A31C
                                    • GetLastError.KERNEL32 ref: 0034A328
                                      • Part of subcall function 0035B580: GetLocalTime.KERNEL32(00000000), ref: 0035B59A
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0034A376
                                    • TranslateMessage.USER32(?), ref: 0034A385
                                    • DispatchMessageA.USER32(?), ref: 0034A390
                                    Strings
                                    • Keylogger initialization failure: error , xrefs: 0034A33C
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                    • String ID: Keylogger initialization failure: error
                                    • API String ID: 3219506041-952744263
                                    • Opcode ID: 184854813ee630f9470cd06c773c5e3376a3aa19d2d77c5a211fc86e157b53f6
                                    • Instruction ID: a57580c10ea176b9c3f954e15b461714ac6599c8314c38c2285f604cfc1f86e7
                                    • Opcode Fuzzy Hash: 184854813ee630f9470cd06c773c5e3376a3aa19d2d77c5a211fc86e157b53f6
                                    • Instruction Fuzzy Hash: 3911E735540604BBC7137F799C0995F77ECEB95711F500A2FF881C6190FA31A504C762
                                    APIs
                                    • SendInput.USER32 ref: 00359A25
                                    • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00359A4D
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00359A74
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00359A92
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00359AB2
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00359AD7
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00359AF9
                                    • SendInput.USER32(00000001,00000000,0000001C), ref: 00359B1C
                                      • Part of subcall function 003599CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 003599D4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InputSend$Virtual
                                    • String ID:
                                    • API String ID: 1167301434-0
                                    • Opcode ID: 7a0e3066a2aa937c4c16128b403c325275e6e8bd18f179beae02a57d6b3c7560
                                    • Instruction ID: 7eb1d43b8b15d4e81b397de620d0cee10495dab35c466e5f78201a20509003a8
                                    • Opcode Fuzzy Hash: 7a0e3066a2aa937c4c16128b403c325275e6e8bd18f179beae02a57d6b3c7560
                                    • Instruction Fuzzy Hash: AE315121248349A9E212DFA5DC41F9FFBEC9FCAB44F04080FB9845B1A1DAA1994C8767
                                    APIs
                                    • GetForegroundWindow.USER32(?,?,00000000), ref: 0034A451
                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 0034A45D
                                    • GetKeyboardLayout.USER32(00000000), ref: 0034A464
                                    • GetKeyState.USER32(00000010), ref: 0034A46E
                                    • GetKeyboardState.USER32(?,?,00000000), ref: 0034A479
                                    • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0034A49C
                                    • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0034A4FC
                                    • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0034A535
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                    • String ID:
                                    • API String ID: 1888522110-0
                                    • Opcode ID: f81cfe56949b88ea51fd52be0c2ac4969da911e80621098a04317df2e41a9202
                                    • Instruction ID: bb5033320fbab47d7594d14522bb36b93987d7cf0d297591c596d27613085c39
                                    • Opcode Fuzzy Hash: f81cfe56949b88ea51fd52be0c2ac4969da911e80621098a04317df2e41a9202
                                    • Instruction Fuzzy Hash: E8317272544708BFD712DFA5DC85FDB77ECEB88744F00092AF245C61A0D7B5A9488B92
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __freea$__alloca_probe_16_free
                                    • String ID: a/p$am/pm$h{8
                                    • API String ID: 2936374016-3506347294
                                    • Opcode ID: 5609950a3f6e453d3884969aca1228f16bd462923c55e787be17e96e84921fac
                                    • Instruction ID: c35a57e295ae6cac1dd90c30a2de5138164a1fe66ebfdb5937d42cc595ca0638
                                    • Opcode Fuzzy Hash: 5609950a3f6e453d3884969aca1228f16bd462923c55e787be17e96e84921fac
                                    • Instruction Fuzzy Hash: 6CD1D531918306CADB2BAF68C855BBEB7B6EF05300F3541DAE505AB651D339DE40CBA1
                                    APIs
                                    • _free.LIBCMT ref: 00389292
                                    • _free.LIBCMT ref: 003892B6
                                    • _free.LIBCMT ref: 0038943D
                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0039F244), ref: 0038944F
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,003B2764,000000FF,00000000,0000003F,00000000,?,?), ref: 003894C7
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,003B27B8,000000FF,?,0000003F,00000000,?), ref: 003894F4
                                    • _free.LIBCMT ref: 00389609
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                    • String ID:
                                    • API String ID: 314583886-0
                                    • Opcode ID: 3920059415fc2d776e4e3f4c502180035c20dde3772df5d50c9d265ba24079ab
                                    • Instruction ID: 989389971ae5f94dd0513f9f4a079e099a5b78e6ac81e67a9e7be5c72619444d
                                    • Opcode Fuzzy Hash: 3920059415fc2d776e4e3f4c502180035c20dde3772df5d50c9d265ba24079ab
                                    • Instruction Fuzzy Hash: FAC12875900304AFCB23BF699C51BBA7BACEF45310F1905DBE4849B292EB709E41C750
                                    APIs
                                    • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00353AF7
                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00353B26
                                    • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00353BC6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Enum$InfoQueryValue
                                    • String ID: [regsplt]$xU;$T;
                                    • API String ID: 3554306468-923166207
                                    • Opcode ID: 958268cb83925e19fa6c4ebfed0f823a4e04f663104740b525e2fcae2256ebf0
                                    • Instruction ID: b10003a56812e01661e3f6dad51879327c9e3dc00215930814c8e81a5ce184f9
                                    • Opcode Fuzzy Hash: 958268cb83925e19fa6c4ebfed0f823a4e04f663104740b525e2fcae2256ebf0
                                    • Instruction Fuzzy Hash: 68512E71900219AADB16EBD5DC82EEFB7BDEF14300F500166F506EA191EF706B49CBA1
                                    APIs
                                    • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0038BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0038B47E
                                    • __fassign.LIBCMT ref: 0038B4F9
                                    • __fassign.LIBCMT ref: 0038B514
                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0038B53A
                                    • WriteFile.KERNEL32(?,FF8BC35D,00000000,0038BBB1,00000000,?,?,?,?,?,?,?,?,?,0038BBB1,?), ref: 0038B559
                                    • WriteFile.KERNEL32(?,?,00000001,0038BBB1,00000000,?,?,?,?,?,?,?,?,?,0038BBB1,?), ref: 0038B592
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                    • String ID:
                                    • API String ID: 1324828854-0
                                    • Opcode ID: 39009e4f1a560b72aae0f042cab69ebd6c7c4bba9cfe1544a504cc8024f76e23
                                    • Instruction ID: a68c330b3d8582cf79d2839f4d4b73d5523bc25700f2bae356ef6ec2037c91ed
                                    • Opcode Fuzzy Hash: 39009e4f1a560b72aae0f042cab69ebd6c7c4bba9cfe1544a504cc8024f76e23
                                    • Instruction Fuzzy Hash: 6051B670A00349AFDB11DFA8DC95AEEFBF8EF09300F15466AE955E7291D7309941CB60
                                    APIs
                                      • Part of subcall function 00353656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,003B50E4), ref: 00353678
                                      • Part of subcall function 00353656: RegQueryValueExW.ADVAPI32(?,0034F34E,00000000,00000000,?,00000400), ref: 00353697
                                      • Part of subcall function 00353656: RegCloseKey.ADVAPI32(?), ref: 003536A0
                                      • Part of subcall function 0035C048: GetCurrentProcess.KERNEL32(?,?,?,0034DAE5,WinDir,00000000,00000000), ref: 0035C059
                                    • _wcslen.LIBCMT ref: 0035B7F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                    • String ID: .exe$8S;$http\shell\open\command$program files (x86)\$program files\
                                    • API String ID: 37874593-3523780989
                                    • Opcode ID: 269c8004a13b895835e22189e8888976af24a8b89c830128d183c46c77ef59d0
                                    • Instruction ID: 3eef5acdaf4598aeb79bf5e8fc43ac285841beae437590b15cba5f969233f40f
                                    • Opcode Fuzzy Hash: 269c8004a13b895835e22189e8888976af24a8b89c830128d183c46c77ef59d0
                                    • Instruction Fuzzy Hash: 87219B62B002046BDB16FAB48C92EFE77ED9F49364F10153DF806AF292EE249D4D4360
                                    APIs
                                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0035B438
                                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0035B44E
                                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0035B467
                                    • InternetCloseHandle.WININET(00000000), ref: 0035B4AD
                                    • InternetCloseHandle.WININET(00000000), ref: 0035B4B0
                                    Strings
                                    • http://geoplugin.net/json.gp, xrefs: 0035B448
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileRead
                                    • String ID: http://geoplugin.net/json.gp
                                    • API String ID: 3121278467-91888290
                                    • Opcode ID: d54770580cbfc893619688924bc8b524ff5a86beb4884d85425dfceb0d26cf45
                                    • Instruction ID: 95a89a027c7b9c5345a39b50a4197f3bf4cb84216ff262bfcff29a7e51b32ae3
                                    • Opcode Fuzzy Hash: d54770580cbfc893619688924bc8b524ff5a86beb4884d85425dfceb0d26cf45
                                    • Instruction Fuzzy Hash: B011B2711053216BD236EF269C4AEBBBFECEF85761F40042EF80596191DB65AC48C6A2
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,003A6478,00000000,00000000,0034D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0035C4C1
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0035C4DE
                                    • CloseHandle.KERNEL32(00000000), ref: 0035C4EA
                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0035C4FB
                                    • CloseHandle.KERNEL32(00000000), ref: 0035C508
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseHandle$CreatePointerWrite
                                    • String ID: xp:
                                    • API String ID: 1852769593-1284522174
                                    • Opcode ID: b98cfa55f082ced7667fdf8ece724fe5dec3581598a0d615633e07ec6e6dfc8a
                                    • Instruction ID: 6362c6a9917aeabed762d497ee5539687323f0b159cb0cc514aa3489c7e27299
                                    • Opcode Fuzzy Hash: b98cfa55f082ced7667fdf8ece724fe5dec3581598a0d615633e07ec6e6dfc8a
                                    • Instruction Fuzzy Hash: 6511E5B12142157FEA134E2AAC99F7B739CEB4636EF11962FFD51D21E0DA619C088630
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 003511AB
                                    • int.LIBCPMT ref: 003511BE
                                      • Part of subcall function 0034E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0034E10D
                                      • Part of subcall function 0034E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0034E127
                                    • std::_Facet_Register.LIBCPMT ref: 003511FE
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00351207
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00351225
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                    • String ID: (m;
                                    • API String ID: 2536120697-2823238276
                                    • Opcode ID: defcf658ab19b701fb516a210d2b45d5d3303dbc6d4227663925cb6d73ae76cf
                                    • Instruction ID: 80221c2fa9fe591090a2a2fa79bd1fa4ab61adaf71d85a60041128ea56b099db
                                    • Opcode Fuzzy Hash: defcf658ab19b701fb516a210d2b45d5d3303dbc6d4227663925cb6d73ae76cf
                                    • Instruction Fuzzy Hash: C1110A36900114A7CB27EB94D802DDDB7B8DF40761F11455AF905AF2A1DFB49E448BD0
                                    APIs
                                      • Part of subcall function 0035C048: GetCurrentProcess.KERNEL32(?,?,?,0034DAE5,WinDir,00000000,00000000), ref: 0035C059
                                      • Part of subcall function 003535E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00353605
                                      • Part of subcall function 003535E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00353622
                                      • Part of subcall function 003535E1: RegCloseKey.ADVAPI32(?), ref: 0035362D
                                    • StrToIntA.SHLWAPI(00000000,003ACA08,00000000,00000000,00000000,003B50E4,00000003,Exe,00000000,0000000E,00000000,003A60CC,00000003,00000000), ref: 0035B3CD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCurrentOpenProcessQueryValue
                                    • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                    • API String ID: 1866151309-2070987746
                                    • Opcode ID: ff8a8d19c46946c182121cabd40ecff9a7302a1608933ca9a8a639b487eb3217
                                    • Instruction ID: e4a60884e420772c942e078bcd33e98450189627003c60efbfabd608ec3dfac9
                                    • Opcode Fuzzy Hash: ff8a8d19c46946c182121cabd40ecff9a7302a1608933ca9a8a639b487eb3217
                                    • Instruction Fuzzy Hash: AC114CA0A4024926C717B768CC97EBFBB9DCB51341F840625F902AF1E3FB50694E83A5
                                    APIs
                                    • GetLastError.KERNEL32(?,?,0037A3D1,0037933E), ref: 0037A3E8
                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0037A3F6
                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0037A40F
                                    • SetLastError.KERNEL32(00000000,?,0037A3D1,0037933E), ref: 0037A461
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastValue___vcrt_
                                    • String ID:
                                    • API String ID: 3852720340-0
                                    • Opcode ID: 408272658f1e40551f3418dd49cfaa5190aa996517088d99592663ed79665a0e
                                    • Instruction ID: 7a4215f1127648822aa731fa8466324146ae1236c3c55c59950899ff5a77681b
                                    • Opcode Fuzzy Hash: 408272658f1e40551f3418dd49cfaa5190aa996517088d99592663ed79665a0e
                                    • Instruction Fuzzy Hash: BB01D832209B115EE637377EAC9E66F268CDB413B9B20C33AF51C496E1EF9B4C405241
                                    APIs
                                    • CoInitializeEx.OLE32(00000000,00000002,00000000,c:\program files (x86)\internet explorer\iexplore.exe), ref: 0034760B
                                      • Part of subcall function 00347538: _wcslen.LIBCMT ref: 0034755C
                                      • Part of subcall function 00347538: CoGetObject.OLE32(?,00000024,003A6528,00000000), ref: 003475BD
                                    • CoUninitialize.OLE32 ref: 00347664
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InitializeObjectUninitialize_wcslen
                                    • String ID: [+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod$c:\program files (x86)\internet explorer\iexplore.exe
                                    • API String ID: 3851391207-3078575637
                                    • Opcode ID: e95c4d86e6a1c2c268a46b39fbd49c84c8578747323e27b00e6b05f1ca33e20e
                                    • Instruction ID: ec56606427bc311639dda9ebac1772694eb894657a63dea72402a12d1940d9c2
                                    • Opcode Fuzzy Hash: e95c4d86e6a1c2c268a46b39fbd49c84c8578747323e27b00e6b05f1ca33e20e
                                    • Instruction Fuzzy Hash: 8F01F5723086106FE3265B65EC0BFAB378DDF41B61F12052EF5008E181DBA5FC0146A1
                                    APIs
                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0034BB18
                                    • GetLastError.KERNEL32 ref: 0034BB22
                                    Strings
                                    • [Chrome Cookies found, cleared!], xrefs: 0034BB48
                                    • UserProfile, xrefs: 0034BAE8
                                    • [Chrome Cookies not found], xrefs: 0034BB3C
                                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0034BAE3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteErrorFileLast
                                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                    • API String ID: 2018770650-304995407
                                    • Opcode ID: 40e01df5e6d59be07f124e23d732aa51e7fa1d0c60a243c498a002dd38e0b845
                                    • Instruction ID: 8fe607161d1cd0280d885dc46bd956e4862063fbc09b18fdc76d7a4daa4bd112
                                    • Opcode Fuzzy Hash: 40e01df5e6d59be07f124e23d732aa51e7fa1d0c60a243c498a002dd38e0b845
                                    • Instruction Fuzzy Hash: 3A01D671A840086A8B07BBB9CC178FEB7E8E922710B841519F4036F1D6EF52A94986D2
                                    APIs
                                    • __allrem.LIBCMT ref: 0037ACE9
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0037AD05
                                    • __allrem.LIBCMT ref: 0037AD1C
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0037AD3A
                                    • __allrem.LIBCMT ref: 0037AD51
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0037AD6F
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                    • String ID:
                                    • API String ID: 1992179935-0
                                    • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                    • Instruction ID: 0e88e4975a4d66deca5e70226e5a42bff9ab99eeacaaf04b988d4c0adaa6d03a
                                    • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                    • Instruction Fuzzy Hash: 7A81FB72600F06ABD737AE78CC91B6F73A9DF80760F25852AF419DA6C1EB78D9008751
                                    APIs
                                    • Sleep.KERNEL32(00000000,0034D29D), ref: 003444C4
                                      • Part of subcall function 00344607: __EH_prolog.LIBCMT ref: 0034460C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: H_prologSleep
                                    • String ID: CloseCamera$FreeFrame$GetFrame$HN;$OpenCamera
                                    • API String ID: 3469354165-2538657253
                                    • Opcode ID: 2fa61ffba27f978776e1154d8c7613d5d8eb64a830e1d3d6325f6a9863572738
                                    • Instruction ID: 33032df3605e9defe2b59b13b6dde9617f82a61ddf0b1d26b60c3a876be508d7
                                    • Opcode Fuzzy Hash: 2fa61ffba27f978776e1154d8c7613d5d8eb64a830e1d3d6325f6a9863572738
                                    • Instruction Fuzzy Hash: FD51D435B042106BCA17FB35981AB6F3BD9AB85740F410628F9066F792DF34BD49C396
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __cftoe
                                    • String ID:
                                    • API String ID: 4189289331-0
                                    • Opcode ID: 88fb7ccbffca9f5fa3ff3e476228d62b6ebdb72bcecd6bc5952bffeb73824e8f
                                    • Instruction ID: e6b30831fea08bdebe3c5b85745dafbeba523221031d0d8a63c20b139a593439
                                    • Opcode Fuzzy Hash: 88fb7ccbffca9f5fa3ff3e476228d62b6ebdb72bcecd6bc5952bffeb73824e8f
                                    • Instruction Fuzzy Hash: 7651DB32900B05EBDB27BB68CCC2EAE77ADEF45334F254299F8159A192DB35D900C764
                                    APIs
                                    • GetLastError.KERNEL32(?,0037F770,0037A875,0037F770,003B4EF8,?,0037CE65,FF8BC35D,003B4EF8,003B4EF8), ref: 00388299
                                    • _free.LIBCMT ref: 003882CC
                                    • _free.LIBCMT ref: 003882F4
                                    • SetLastError.KERNEL32(00000000,FF8BC35D,003B4EF8,003B4EF8), ref: 00388301
                                    • SetLastError.KERNEL32(00000000,FF8BC35D,003B4EF8,003B4EF8), ref: 0038830D
                                    • _abort.LIBCMT ref: 00388313
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free$_abort
                                    • String ID:
                                    • API String ID: 3160817290-0
                                    • Opcode ID: 468a9c0d94b32466458560a4a427123941d23982d6addb422dba30f9d0864e8a
                                    • Instruction ID: 092b425967f4f95a739898005d098faacc3c615822a6e752ad14149e37095f4d
                                    • Opcode Fuzzy Hash: 468a9c0d94b32466458560a4a427123941d23982d6addb422dba30f9d0864e8a
                                    • Instruction Fuzzy Hash: 38F0C83A100B002BC61373296C1BF6B271D8FD2775FB20999F9589A692EF7188024315
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0035A6B4,00000000), ref: 0035AB46
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0035A6B4,00000000), ref: 0035AB5A
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0035A6B4,00000000), ref: 0035AB67
                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0035A6B4,00000000), ref: 0035AB76
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0035A6B4,00000000), ref: 0035AB88
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0035A6B4,00000000), ref: 0035AB8B
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ControlManager
                                    • String ID:
                                    • API String ID: 221034970-0
                                    • Opcode ID: c6e4aed54aeb8171e73ef82200ec6edf8bf676257856c1fd38049576fe19e3c6
                                    • Instruction ID: cc22bdad99a8f65bfa947fdbd2394764282a304f4dc75909946b713746b4c28a
                                    • Opcode Fuzzy Hash: c6e4aed54aeb8171e73ef82200ec6edf8bf676257856c1fd38049576fe19e3c6
                                    • Instruction Fuzzy Hash: 6BF0F6315002187BD7226B289C8AFFF3BACDB453A1F00011BFD1987251EB259D4A95F1
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0035A731,00000000), ref: 0035AAE4
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0035A731,00000000), ref: 0035AAF9
                                    • CloseServiceHandle.ADVAPI32(00000000,?,0035A731,00000000), ref: 0035AB06
                                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0035A731,00000000), ref: 0035AB11
                                    • CloseServiceHandle.ADVAPI32(00000000,?,0035A731,00000000), ref: 0035AB23
                                    • CloseServiceHandle.ADVAPI32(00000000,?,0035A731,00000000), ref: 0035AB26
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ManagerStart
                                    • String ID:
                                    • API String ID: 276877138-0
                                    • Opcode ID: b946333cb7a4700fb97926d30f92cc8de215c9af98c51b6f24e1d1f9cf6c31b7
                                    • Instruction ID: 91542024ef6111ae76e75bf86c4cbc3a5e641d7d931e4f1dce8331cc56be225f
                                    • Opcode Fuzzy Hash: b946333cb7a4700fb97926d30f92cc8de215c9af98c51b6f24e1d1f9cf6c31b7
                                    • Instruction Fuzzy Hash: 17F0E9711415246FE2135B249C89EFF2BACDF85351F00001FF811862109B658C49A5B1
                                    APIs
                                    • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0034B1AD
                                    • wsprintfW.USER32 ref: 0034B22E
                                      • Part of subcall function 0034A671: SetEvent.KERNEL32(?,?,00000000,0034B245,00000000), ref: 0034A69D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EventLocalTimewsprintf
                                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                    • API String ID: 1497725170-248792730
                                    • Opcode ID: 0dfc359f1a0448b4462c82172ff8f3c682d1d41bb0b7f626becdc74dcfbe91e9
                                    • Instruction ID: ad766547ec0287231bb3ccbb75dd449ee7d21c94e863409362915b36c6441e2f
                                    • Opcode Fuzzy Hash: 0dfc359f1a0448b4462c82172ff8f3c682d1d41bb0b7f626becdc74dcfbe91e9
                                    • Instruction Fuzzy Hash: B2116A76404118AACB1AFB95EC519FE77FCEE48311B00011EF5465E191FF786A86C7A4
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0034A788), ref: 0034A6E6
                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0034A788), ref: 0034A6F5
                                    • Sleep.KERNEL32(00002710,?,?,?,0034A788), ref: 0034A722
                                    • CloseHandle.KERNEL32(00000000,?,?,?,0034A788), ref: 0034A729
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleSizeSleep
                                    • String ID: XQ;
                                    • API String ID: 1958988193-2403672875
                                    • Opcode ID: 65b4360dfd8d0d217109f202b0daccbfa834926dc77a4c31ce2de3cd411b953e
                                    • Instruction ID: 8cbe5b70193cdd85618aaedf2c9ebc513f0fd6f6d1141c92c4de6cf0bbab3998
                                    • Opcode Fuzzy Hash: 65b4360dfd8d0d217109f202b0daccbfa834926dc77a4c31ce2de3cd411b953e
                                    • Instruction Fuzzy Hash: A1112030280E406EDF33A76898C972E7FEEAB45355F45050EE2824F992C6157844C712
                                    APIs
                                    • RegisterClassExA.USER32(00000030), ref: 0035D5EC
                                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0035D607
                                    • GetLastError.KERNEL32 ref: 0035D611
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ClassCreateErrorLastRegisterWindow
                                    • String ID: 0$MsgWindowClass
                                    • API String ID: 2877667751-2410386613
                                    • Opcode ID: 066b9ad86306bc3032853d8268713ac1ea86a75ad8dda0dab117beaa83c7484f
                                    • Instruction ID: f7eafc31b01e259ec77ccdd517258df00dcdfca4fda691d78fb4034f67d8641f
                                    • Opcode Fuzzy Hash: 066b9ad86306bc3032853d8268713ac1ea86a75ad8dda0dab117beaa83c7484f
                                    • Instruction Fuzzy Hash: 080129B190021CABDB12DFD9DC84DEFBBBCEA04355F40052AF914A6240D67149058BA0
                                    APIs
                                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 003477D6
                                    • CloseHandle.KERNEL32(?), ref: 003477E5
                                    • CloseHandle.KERNEL32(?), ref: 003477EA
                                    Strings
                                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 003477CC
                                    • C:\Windows\System32\cmd.exe, xrefs: 003477D1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$CreateProcess
                                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                    • API String ID: 2922976086-4183131282
                                    • Opcode ID: fdb33d336386e622eebeb788a32417fb3528a2d714ce4735bc8d2f023f751918
                                    • Instruction ID: 97d0709655e361e29efc0565da416b5a2382ef383a471a21b7061049e69b0986
                                    • Opcode Fuzzy Hash: fdb33d336386e622eebeb788a32417fb3528a2d714ce4735bc8d2f023f751918
                                    • Instruction Fuzzy Hash: DAF09072D4029C7ACB31ABDAAC0EEDF7F3CEBC6B10F00051AFA08A6044DA715000CAB0
                                    Strings
                                    • c:\program files (x86)\internet explorer\iexplore.exe, xrefs: 003476FF
                                    • S;, xrefs: 00347715
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: S;$c:\program files (x86)\internet explorer\iexplore.exe
                                    • API String ID: 0-3816954683
                                    • Opcode ID: dafbdad6d35603740180d706bb5ace637177c08f1aa2001fc2c2d221814913e6
                                    • Instruction ID: fc6ca20a228a5529661993161b8274c7eb41e36a0fe93c5c214c1a5260df9c0a
                                    • Opcode Fuzzy Hash: dafbdad6d35603740180d706bb5ace637177c08f1aa2001fc2c2d221814913e6
                                    • Instruction Fuzzy Hash: FEF02474605540ABDB077B389D397B93ADED78638AF810A3AF242DE2A1EB6558428310
                                    APIs
                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0038338B,00000000,?,0038332B,00000000,003AE958,0000000C,00383482,00000000,00000002), ref: 003833FA
                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0038340D
                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0038338B,00000000,?,0038332B,00000000,003AE958,0000000C,00383482,00000000,00000002), ref: 00383430
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressFreeHandleLibraryModuleProc
                                    • String ID: CorExitProcess$mscoree.dll
                                    • API String ID: 4061214504-1276376045
                                    • Opcode ID: c36208bba1c607daae417b2813aae29728d867da419dbb8db55d7db771473838
                                    • Instruction ID: 50e61f893623c3799b36afa9bd850d1d7d815bcf89a7168786ea16e5bf7e23ed
                                    • Opcode Fuzzy Hash: c36208bba1c607daae417b2813aae29728d867da419dbb8db55d7db771473838
                                    • Instruction Fuzzy Hash: 12F0443190420CBBCB17AFA5DC49BAEBFB8EB08752F41409AF805A6250DB754E40CB91
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,003B4EF8,00344E7A,00000001,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000), ref: 00345120
                                    • SetEvent.KERNEL32(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000), ref: 0034512C
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000), ref: 00345137
                                    • CloseHandle.KERNEL32(?,?,00000000,003B4EF8,00344CA8,00000000,?,?,00000000), ref: 00345140
                                      • Part of subcall function 0035B580: GetLocalTime.KERNEL32(00000000), ref: 0035B59A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                    • String ID: KeepAlive | Disabled
                                    • API String ID: 2993684571-305739064
                                    • Opcode ID: 9c32f6cfd7118a6cd5536dc18f6b293ad04bcba9060cd0325d5267447f349a7d
                                    • Instruction ID: b534bc2852af62220cae799db9e5f42b1dd60806073558ecdcb8dea283241582
                                    • Opcode Fuzzy Hash: 9c32f6cfd7118a6cd5536dc18f6b293ad04bcba9060cd0325d5267447f349a7d
                                    • Instruction Fuzzy Hash: 3EF090759047007FEB233B788D0BBAABED8AB07311F050A1FF8D2856B2D5625840CB92
                                    APIs
                                    • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0035B54A
                                    • LoadResource.KERNEL32(00000000,?,?,0034F419,00000000), ref: 0035B55E
                                    • LockResource.KERNEL32(00000000,?,?,0034F419,00000000), ref: 0035B565
                                    • SizeofResource.KERNEL32(00000000,?,?,0034F419,00000000), ref: 0035B574
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Resource$FindLoadLockSizeof
                                    • String ID: SETTINGS
                                    • API String ID: 3473537107-594951305
                                    • Opcode ID: 5fe344484ea025140077c5c09031c473048dd1213fb026ead0522a64feb5871f
                                    • Instruction ID: 0f2738c03893dc222f7da8046fb76f2fe1c82fc1af86cd204d2ca5cde081306f
                                    • Opcode Fuzzy Hash: 5fe344484ea025140077c5c09031c473048dd1213fb026ead0522a64feb5871f
                                    • Instruction Fuzzy Hash: 46E01275600311ABDB271B69AC4CE477E2DF7CA757B01065FF61186230C6324410D710
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ee20bf28cd27d8fbf06eacb1d47848d223d6cb7deae7eedbe6b966db935a6523
                                    • Instruction ID: 51bb5e68be2f5fa0664caa4bb52371236e478da1abe0e233c4d96f068bde7fbf
                                    • Opcode Fuzzy Hash: ee20bf28cd27d8fbf06eacb1d47848d223d6cb7deae7eedbe6b966db935a6523
                                    • Instruction Fuzzy Hash: C371B671901356DBCB23AF55C884ABFBB7DEF96310F1942A9E85567180E7708D42CBA0
                                    APIs
                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0039F244), ref: 0038944F
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,003B2764,000000FF,00000000,0000003F,00000000,?,?), ref: 003894C7
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,003B27B8,000000FF,?,0000003F,00000000,?), ref: 003894F4
                                    • _free.LIBCMT ref: 0038943D
                                      • Part of subcall function 00386802: HeapFree.KERNEL32(00000000,00000000,?,00390CEF,?,00000000,?,00000000,?,00390F93,?,00000007,?,?,003914DE,?), ref: 00386818
                                      • Part of subcall function 00386802: GetLastError.KERNEL32(?,?,00390CEF,?,00000000,?,00000000,?,00390F93,?,00000007,?,?,003914DE,?,?), ref: 0038682A
                                    • _free.LIBCMT ref: 00389609
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                    • String ID:
                                    • API String ID: 1286116820-0
                                    • Opcode ID: 02b4237b31823349f75280a51cad093e70978255753457eb420e605c1ee4a347
                                    • Instruction ID: 64fe23bdce2125b15965b3ba847c82eb1ccbb5d6bfc04a1c63e8b44775f3fd98
                                    • Opcode Fuzzy Hash: 02b4237b31823349f75280a51cad093e70978255753457eb420e605c1ee4a347
                                    • Instruction Fuzzy Hash: 7E51C371900309AFCB13FF699C82ABAB7BCEB45324F1507EBE51497191EB309E418B50
                                    APIs
                                      • Part of subcall function 0035C048: GetCurrentProcess.KERNEL32(?,?,?,0034DAE5,WinDir,00000000,00000000), ref: 0035C059
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0034F956
                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0034F97A
                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0034F989
                                    • CloseHandle.KERNEL32(00000000), ref: 0034FB40
                                      • Part of subcall function 0035C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0034F634,00000000,?,?,003B5338), ref: 0035C08B
                                      • Part of subcall function 0035C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0035C286
                                      • Part of subcall function 0035C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0035C299
                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0034FB31
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                    • String ID:
                                    • API String ID: 4269425633-0
                                    • Opcode ID: de28ac6dd2c77a15fb980e98000b9aee1704e2afb82ea86e6a153bac798fa58b
                                    • Instruction ID: 02e1c783a1e03f7b0c0dbdd06c936c27ca3d39f1afc8c4321daf961bb61f5e64
                                    • Opcode Fuzzy Hash: de28ac6dd2c77a15fb980e98000b9aee1704e2afb82ea86e6a153bac798fa58b
                                    • Instruction Fuzzy Hash: CE41F3311086409BC326FB65DC52AEFB3E9AF95301F50492DF58A8E1A1EF316A4EC652
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0037F918,?,00000000,?,00000001,?,?,00000001,0037F918,?), ref: 003911F9
                                    • __alloca_probe_16.LIBCMT ref: 00391231
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00391282
                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0037AF04,?), ref: 00391294
                                    • __freea.LIBCMT ref: 0039129D
                                      • Part of subcall function 003861B8: HeapAlloc.KERNEL32(00000000,00375349,?,?,003788C7,?,?,?,?,?,0034DE9D,00375349,?,?,?,?), ref: 003861EA
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
                                    • String ID:
                                    • API String ID: 1857427562-0
                                    • Opcode ID: 279302553b00e23327d702fe3b8012540eef2332751c327053a752ba5b870f03
                                    • Instruction ID: 12812b77249a094388f0e78511a386048d5b10e6cde42d54631cabab50a477f5
                                    • Opcode Fuzzy Hash: 279302553b00e23327d702fe3b8012540eef2332751c327053a752ba5b870f03
                                    • Instruction Fuzzy Hash: 7C31E132A0020AABDF26AF68CC85DAF7BA5EB40710F154529FC08EB290E735DD51CB90
                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32 ref: 0038F3E3
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0038F406
                                      • Part of subcall function 003861B8: HeapAlloc.KERNEL32(00000000,00375349,?,?,003788C7,?,?,?,?,?,0034DE9D,00375349,?,?,?,?), ref: 003861EA
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0038F42C
                                    • _free.LIBCMT ref: 0038F43F
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0038F44E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocFreeHeap_free
                                    • String ID:
                                    • API String ID: 2278895681-0
                                    • Opcode ID: f6fa52af1abf1738bed8d2924c2af0657db6a0af5d095b98b96ac047701591f6
                                    • Instruction ID: 13ae49ff9dfd9a4d434148b829c2304965ba5bb8a2b557c057ea7c7a67fdb40a
                                    • Opcode Fuzzy Hash: f6fa52af1abf1738bed8d2924c2af0657db6a0af5d095b98b96ac047701591f6
                                    • Instruction Fuzzy Hash: 7101B5726027117F232326AB5C8DC7B6A6CDAC6B60765017FF904D7201DA618D0293B1
                                    APIs
                                    • GetLastError.KERNEL32(?,00000000,00000000,0037BCD6,00000000,?,?,0037BD5A,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0038831E
                                    • _free.LIBCMT ref: 00388353
                                    • _free.LIBCMT ref: 0038837A
                                    • SetLastError.KERNEL32(00000000), ref: 00388387
                                    • SetLastError.KERNEL32(00000000), ref: 00388390
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free
                                    • String ID:
                                    • API String ID: 3170660625-0
                                    • Opcode ID: 9213b05771ba3eb8452ec8d9e969a074fdda05bf26b3dc28a77b1bd82482787f
                                    • Instruction ID: c7c145024d3385f216d54379a14c32cec2d3e8e8544605ee354caf5547d2b1fc
                                    • Opcode Fuzzy Hash: 9213b05771ba3eb8452ec8d9e969a074fdda05bf26b3dc28a77b1bd82482787f
                                    • Instruction Fuzzy Hash: 3601F93E1007002BC71377296C46E6B221D9BD2B74BB609AAFA1896691EFB188014310
                                    APIs
                                    • _free.LIBCMT ref: 00390A54
                                      • Part of subcall function 00386802: HeapFree.KERNEL32(00000000,00000000,?,00390CEF,?,00000000,?,00000000,?,00390F93,?,00000007,?,?,003914DE,?), ref: 00386818
                                      • Part of subcall function 00386802: GetLastError.KERNEL32(?,?,00390CEF,?,00000000,?,00000000,?,00390F93,?,00000007,?,?,003914DE,?,?), ref: 0038682A
                                    • _free.LIBCMT ref: 00390A66
                                    • _free.LIBCMT ref: 00390A78
                                    • _free.LIBCMT ref: 00390A8A
                                    • _free.LIBCMT ref: 00390A9C
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 37b7cc2639e5f87ff95b20a6eaf1c58d2e2c8f0f74f853782d8bcc6fc0a8d471
                                    • Instruction ID: 063650130d5f7dd06549e4a8801368d989973300da4cd0110a12e810085d611e
                                    • Opcode Fuzzy Hash: 37b7cc2639e5f87ff95b20a6eaf1c58d2e2c8f0f74f853782d8bcc6fc0a8d471
                                    • Instruction Fuzzy Hash: 27F01D72504700AFCA26FB6CE993C1A73EDAB04750BB58D59F249DB541CB74FC808BA4
                                    APIs
                                    • _free.LIBCMT ref: 00384106
                                      • Part of subcall function 00386802: HeapFree.KERNEL32(00000000,00000000,?,00390CEF,?,00000000,?,00000000,?,00390F93,?,00000007,?,?,003914DE,?), ref: 00386818
                                      • Part of subcall function 00386802: GetLastError.KERNEL32(?,?,00390CEF,?,00000000,?,00000000,?,00390F93,?,00000007,?,?,003914DE,?,?), ref: 0038682A
                                    • _free.LIBCMT ref: 00384118
                                    • _free.LIBCMT ref: 0038412B
                                    • _free.LIBCMT ref: 0038413C
                                    • _free.LIBCMT ref: 0038414D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 9f3a85371342016cf70533b2d794e300c8fa20b4dc617cb3f82fe4139eae643b
                                    • Instruction ID: 3333d9e83e8d36c489c8bce912f5dfb241235525c904fd6e73328d38848c5762
                                    • Opcode Fuzzy Hash: 9f3a85371342016cf70533b2d794e300c8fa20b4dc617cb3f82fe4139eae643b
                                    • Instruction Fuzzy Hash: E0F05E719007208FD723BF14BC638067BA9BB05728B954B96F6186BA71CF704941DFC2
                                    APIs
                                    • _strpbrk.LIBCMT ref: 0038E7B8
                                    • _free.LIBCMT ref: 0038E8D5
                                      • Part of subcall function 0037BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0037BD3A,?,?,?,00000000,?,00000000,?,?,0037BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0037BD6A
                                      • Part of subcall function 0037BD68: GetCurrentProcess.KERNEL32(C0000417), ref: 0037BD8C
                                      • Part of subcall function 0037BD68: TerminateProcess.KERNEL32(00000000), ref: 0037BD93
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                    • String ID: *?$.
                                    • API String ID: 2812119850-3972193922
                                    • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                    • Instruction ID: 634140c60fec4ad6b7e9dcab27002efeb0d70e3d49e06a1dc5733e302befdade
                                    • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                    • Instruction Fuzzy Hash: D851C171E0021AEFDF16EFA8C881AADB7B5EF48710F2581A9E854E7300E6759A01CB50
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,c:\program files (x86)\internet explorer\iexplore.exe,00000104), ref: 00383515
                                    • _free.LIBCMT ref: 003835E0
                                    • _free.LIBCMT ref: 003835EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$FileModuleName
                                    • String ID: c:\program files (x86)\internet explorer\iexplore.exe
                                    • API String ID: 2506810119-3790112267
                                    • Opcode ID: 80861aaf3c3b41909525234789cddd7ea15d6d9745ef1e797741398abf5389ad
                                    • Instruction ID: 0277929069243d56db634bb857f75b2321022168f481fa7a7e69821dc09241db
                                    • Opcode Fuzzy Hash: 80861aaf3c3b41909525234789cddd7ea15d6d9745ef1e797741398abf5389ad
                                    • Instruction Fuzzy Hash: 1B316FB1A00358AFDB23EB99DC8599EBBFCEB86B10F1041A6F5059B311D6708B458B51
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00344066
                                      • Part of subcall function 0035BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,003A6478,0034D248,.vbs,?,?,?,?,?,003B52F0), ref: 0035BA30
                                      • Part of subcall function 003585A3: CloseHandle.KERNEL32(003440F5,?,?,003440F5,003A5E84), ref: 003585B9
                                      • Part of subcall function 003585A3: CloseHandle.KERNEL32(003A5E84,?,?,003440F5,003A5E84), ref: 003585C2
                                      • Part of subcall function 0035C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0034A87E), ref: 0035C52F
                                    • Sleep.KERNEL32(000000FA,003A5E84), ref: 00344138
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                    • String ID: /sort "Visit Time" /stext "$0N;
                                    • API String ID: 368326130-3864733987
                                    • Opcode ID: 925480d20fb04474e0db1256c568ffa09e32a06549c1fd7b6f607fe5d473c2f4
                                    • Instruction ID: 8c3ad80b2d7b7e9923d0c7ecf5b92cac181643d40522537c918b6682d2ccc616
                                    • Opcode Fuzzy Hash: 925480d20fb04474e0db1256c568ffa09e32a06549c1fd7b6f607fe5d473c2f4
                                    • Instruction Fuzzy Hash: 193144319101185BCB16FBB4DC96AEEB7F5AF51301F400169F506AF592EF207E8ECA91
                                    APIs
                                    • send.WS2_32(?,00000000,00000000,00000000), ref: 00344B36
                                    • WaitForSingleObject.KERNEL32(?,00000000,s\5L,?,?,00000004,?,?,00000004,003B4EE0,003B5598,00000000), ref: 00344B47
                                    • SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,003B4EE0,003B5598,00000000,?,?,?,?,?,00355C73), ref: 00344B75
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EventObjectSingleWaitsend
                                    • String ID: s\5L
                                    • API String ID: 3963590051-3761490103
                                    • Opcode ID: 49721c307a8e753744ca035c6b25b77ae1c9cb469b5d71804ecb0a343d3e9532
                                    • Instruction ID: 5e67947b1e1b0d1f56088574c79940383f229abb043f5fdbfae89a4c6da1da71
                                    • Opcode Fuzzy Hash: 49721c307a8e753744ca035c6b25b77ae1c9cb469b5d71804ecb0a343d3e9532
                                    • Instruction Fuzzy Hash: 5A2157729005196BDF06FBB4DC95DEEB77CFF14310B004519F516AE192EB34B609C6A0
                                    APIs
                                    • _wcslen.LIBCMT ref: 00356330
                                      • Part of subcall function 003538B2: RegCreateKeyA.ADVAPI32(80000001,00000000,003A60B4), ref: 003538C0
                                      • Part of subcall function 003538B2: RegSetValueExA.KERNELBASE(003A60B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0034C18D,003A6C58,00000001,000000AF,003A60B4), ref: 003538DB
                                      • Part of subcall function 003538B2: RegCloseKey.ADVAPI32(003A60B4,?,?,?,0034C18D,003A6C58,00000001,000000AF,003A60B4), ref: 003538E6
                                      • Part of subcall function 00349E1F: _wcslen.LIBCMT ref: 00349E38
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _wcslen$CloseCreateValue
                                    • String ID: !D4$okmode$P;
                                    • API String ID: 3411444782-1654074121
                                    • Opcode ID: a1367a3c6a5e8bdbe6f93fc641eecfcda553be228ce84b2c7df82b1d6878cf2d
                                    • Instruction ID: 55aa458d57e246ea1492e1fb933721c400e0e228ec00d4291b0be4bd769c760c
                                    • Opcode Fuzzy Hash: a1367a3c6a5e8bdbe6f93fc641eecfcda553be228ce84b2c7df82b1d6878cf2d
                                    • Instruction Fuzzy Hash: 49110A35754A001BDA2F77349833B7D62DADF90744F80092DFA028F6E2DE286CC95315
                                    APIs
                                      • Part of subcall function 0034C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0034C531
                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0034C658
                                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0034C6C3
                                    Strings
                                    • User Data\Profile ?\Network\Cookies, xrefs: 0034C670
                                    • User Data\Default\Network\Cookies, xrefs: 0034C63E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                    • API String ID: 1174141254-1980882731
                                    • Opcode ID: 36e96cc045eace6c8f8c71f97a126f0564208b161ce43df4dda5ec2ac2583306
                                    • Instruction ID: 24512edde29ec3758d8a662fe81528b65697ad44e8bebc5c4a6f6950e1a45c42
                                    • Opcode Fuzzy Hash: 36e96cc045eace6c8f8c71f97a126f0564208b161ce43df4dda5ec2ac2583306
                                    • Instruction Fuzzy Hash: 272133319101096ACB46FBA5DC56DFEBBBCEE50311F441129F506AF191EF20B94BCA90
                                    APIs
                                      • Part of subcall function 0034C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0034C594
                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0034C727
                                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0034C792
                                    Strings
                                    • User Data\Profile ?\Network\Cookies, xrefs: 0034C73F
                                    • User Data\Default\Network\Cookies, xrefs: 0034C70D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                    • API String ID: 1174141254-1980882731
                                    • Opcode ID: f1eb6302f28b13880fe4bf7dabba40ba8d7e3979aee5b010c6baa957dff308d7
                                    • Instruction ID: f61092453b91efb6524e29e9085be2e68d5f8e7e8c8b0d794610ade06f36ea4e
                                    • Opcode Fuzzy Hash: f1eb6302f28b13880fe4bf7dabba40ba8d7e3979aee5b010c6baa957dff308d7
                                    • Instruction Fuzzy Hash: 872130319101096BCB46FBA5DC56DEEBBBCEE50351F400129F506AF192EF20B98BCA90
                                    APIs
                                    • CreateThread.KERNEL32(00000000,00000000,0034A2B8,?,00000000,00000000), ref: 0034A239
                                    • CreateThread.KERNEL32(00000000,00000000,0034A2A2,?,00000000,00000000), ref: 0034A249
                                    • CreateThread.KERNEL32(00000000,00000000,0034A2C4,?,00000000,00000000), ref: 0034A255
                                      • Part of subcall function 0034B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0034B1AD
                                      • Part of subcall function 0034B19F: wsprintfW.USER32 ref: 0034B22E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateThread$LocalTimewsprintf
                                    • String ID: Offline Keylogger Started
                                    • API String ID: 465354869-4114347211
                                    • Opcode ID: 64da09008d744cbc20b2af81fdaf2fd7650af3f3a79355019b712f0ad0788c03
                                    • Instruction ID: 77266d66fe566c1f7bf393dc306105f12cb32fc4e54c4973d7fc1ae75ea3f843
                                    • Opcode Fuzzy Hash: 64da09008d744cbc20b2af81fdaf2fd7650af3f3a79355019b712f0ad0788c03
                                    • Instruction Fuzzy Hash: 05118D712406087ED216BB358C87CBFB6DDDA41394B40091DF8461E192EB617D18DAF3
                                    APIs
                                    • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00346ABD
                                    • GetProcAddress.KERNEL32(00000000), ref: 00346AC4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: CryptUnprotectData$crypt32
                                    • API String ID: 2574300362-2380590389
                                    • Opcode ID: 4fea3c7ece23c29573f0565d3c1ba7195c4f3c207b462a32706413bfb41d904b
                                    • Instruction ID: 94cee280eb91d2c7c0a65a2eab01dfe01129a5b8701f115ed4389685e47d4e3d
                                    • Opcode Fuzzy Hash: 4fea3c7ece23c29573f0565d3c1ba7195c4f3c207b462a32706413bfb41d904b
                                    • Instruction Fuzzy Hash: 8E01D875A04206ABCB1ACFADDC459AF7BFCEF49340F0442AEE955D7241DA71A900C791
                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00345159), ref: 00345173
                                    • CloseHandle.KERNEL32(?), ref: 003451CA
                                    • SetEvent.KERNEL32(?), ref: 003451D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEventHandleObjectSingleWait
                                    • String ID: Connection Timeout
                                    • API String ID: 2055531096-499159329
                                    • Opcode ID: 3be2b2f405e324099cad77118337dd9462a58bc798b0cdadbbfc0a6abbab9a13
                                    • Instruction ID: e932cd54189a6f8dea4f71e85efaeb8a5467df58cd35c05fb508ce35fddeb063
                                    • Opcode Fuzzy Hash: 3be2b2f405e324099cad77118337dd9462a58bc798b0cdadbbfc0a6abbab9a13
                                    • Instruction Fuzzy Hash: F501FC35A40F40AFDB276B398C8656BFBD4FF01301704092EE1D34AA72D621B400CF51
                                    APIs
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0034E86E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Exception@8Throw
                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                    • API String ID: 2005118841-1866435925
                                    • Opcode ID: bb942f42072f7fea10930f571a2c4997687f0ebfcbcbe405e4a19230c924bd75
                                    • Instruction ID: 0ee8d0fa55d1a859e16eebe59d8c0df8b1801b4e2bff9f595d66cf819e525137
                                    • Opcode Fuzzy Hash: bb942f42072f7fea10930f571a2c4997687f0ebfcbcbe405e4a19230c924bd75
                                    • Instruction Fuzzy Hash: 29018161A443086EEF17E6A4CC53FFE73E9BB11B00F148459B9156D4C2EA64BA01D662
                                    APIs
                                    • RegCreateKeyW.ADVAPI32(80000001,00000000,003B52D8), ref: 0035385A
                                    • RegSetValueExW.ADVAPI32(003B52D8,?,00000000,00000001,00000000,00000000,003B52F0,?,0034F85E,pth_unenc,003B52D8), ref: 00353888
                                    • RegCloseKey.ADVAPI32(003B52D8,?,0034F85E,pth_unenc,003B52D8), ref: 00353893
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID: pth_unenc
                                    • API String ID: 1818849710-4028850238
                                    • Opcode ID: 73eaaf6f824a47a8b6f77d560de0952f5023f8f09657ab5fb29dc82ab758f975
                                    • Instruction ID: 0e713d6521270703c24f89b41c0cfbef4d8dbbac9e8190e25c24c0f1b59ca57c
                                    • Opcode Fuzzy Hash: 73eaaf6f824a47a8b6f77d560de0952f5023f8f09657ab5fb29dc82ab758f975
                                    • Instruction Fuzzy Hash: C2F06271540118BBDF019FA5EC45FEA376CEF44751F10421AFD159A160E732AA18DA90
                                    APIs
                                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0035616B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID: /C $cmd.exe$open
                                    • API String ID: 587946157-3896048727
                                    • Opcode ID: c2bb2f3854bf26dec34ae8cd2c5d262c63d3e9151ede94e77768225c25478728
                                    • Instruction ID: 7b3d41387c16e1650459f9e388d6f553078758c20973fd883575f85cc5ee7ae4
                                    • Opcode Fuzzy Hash: c2bb2f3854bf26dec34ae8cd2c5d262c63d3e9151ede94e77768225c25478728
                                    • Instruction Fuzzy Hash: 15E030702043046EC206FAA4CC92DAFB7ECEA50700B40082CB0028A0A2EF64A9498610
                                    APIs
                                    • TerminateThread.KERNEL32(0034A2B8,00000000,003B52F0,pth_unenc,0034D0F3,003B52D8,003B52F0,?,pth_unenc), ref: 0034B8F6
                                    • UnhookWindowsHookEx.USER32(003B50F0), ref: 0034B902
                                    • TerminateThread.KERNEL32(0034A2A2,00000000,?,pth_unenc), ref: 0034B910
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: TerminateThread$HookUnhookWindows
                                    • String ID: pth_unenc
                                    • API String ID: 3123878439-4028850238
                                    • Opcode ID: b27aaa7bc09b4987e69e2c86b26d7b6c2dacb802e07f4b9373eeb2f867df05b2
                                    • Instruction ID: 420b32fa09786f6a5a9d0dd23526912b3cbaaf227f514dc3bf4ec4a8c01a34c6
                                    • Opcode Fuzzy Hash: b27aaa7bc09b4987e69e2c86b26d7b6c2dacb802e07f4b9373eeb2f867df05b2
                                    • Instruction Fuzzy Hash: 14E0C231244715FFE7221F989CC88A5BBEDEA04389314082FF2C249530C7B25C40D750
                                    APIs
                                    • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00341414
                                    • GetProcAddress.KERNEL32(00000000), ref: 0034141B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: GetCursorInfo$User32.dll
                                    • API String ID: 1646373207-2714051624
                                    • Opcode ID: b46a03cdea4ffd3cfef04d3b221c00720b7ce4776642ab80ef70547d8805842e
                                    • Instruction ID: 60f477d31e198e534f957550cc0d955148ebcc4d60311d7c28a72a3b573af88c
                                    • Opcode Fuzzy Hash: b46a03cdea4ffd3cfef04d3b221c00720b7ce4776642ab80ef70547d8805842e
                                    • Instruction Fuzzy Hash: 37B092B0691708BB8F032BB8AE0EA893A3DF619702B00195BF142911A1DBBA50009A20
                                    APIs
                                    • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 003414B9
                                    • GetProcAddress.KERNEL32(00000000), ref: 003414C0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: GetLastInputInfo$User32.dll
                                    • API String ID: 2574300362-1519888992
                                    • Opcode ID: b5f7068f5e81ac10fea2f78f60b2c3200568b0024501747d90fa19e8eae1f62e
                                    • Instruction ID: 656c9e1dfa1f72499c2693e36f07581436b579646b7604cff32783275c443762
                                    • Opcode Fuzzy Hash: b5f7068f5e81ac10fea2f78f60b2c3200568b0024501747d90fa19e8eae1f62e
                                    • Instruction Fuzzy Hash: D1B092B0690308AB8B031BA8AD0EA4E3AACFA59703B00198FF541C11A0EBB600009F12
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __alldvrm$_strrchr
                                    • String ID:
                                    • API String ID: 1036877536-0
                                    • Opcode ID: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                    • Instruction ID: b21fb2a987f46e1224dbd4a57aef8687a3a295e8f4eb8ad313000669242ce92e
                                    • Opcode Fuzzy Hash: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                    • Instruction Fuzzy Hash: 79A18971904B469FFB23EF28C8817AEBBE5EF51310F2945EEE4849B281D2798D41C752
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6ee2ad4a8512dcb927d4970b1c50547ca10f587be4c977d56490bf9c1e742f4d
                                    • Instruction ID: e81d0da5fb7dd555dd6601973025e51bc038c429d24a43584051fc360b942eed
                                    • Opcode Fuzzy Hash: 6ee2ad4a8512dcb927d4970b1c50547ca10f587be4c977d56490bf9c1e742f4d
                                    • Instruction Fuzzy Hash: 6D412972A00704AFDB26BF78CC41B6BBBE8EB88710F10456AF055DF2C1E37199158790
                                    APIs
                                    Strings
                                    • Cleared browsers logins and cookies., xrefs: 0034C130
                                    • [Cleared browsers logins and cookies.], xrefs: 0034C11F
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep
                                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                    • API String ID: 3472027048-1236744412
                                    • Opcode ID: b772b755128eaa227b152c2352cd53ac9bfad0e31d9f04d4849d8d0b55666c31
                                    • Instruction ID: ca8f74b78f7d6fecdbf21b86b9bcd6003dcf976acae7e75d40fbd91e1d39207e
                                    • Opcode Fuzzy Hash: b772b755128eaa227b152c2352cd53ac9bfad0e31d9f04d4849d8d0b55666c31
                                    • Instruction Fuzzy Hash: 9531F90475E380ADDA27AB7418127EBBFC24E53744F09955CF8C41F393D952A80C8763
                                    APIs
                                      • Part of subcall function 0035C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0035C5F2
                                      • Part of subcall function 0035C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0035C5FB
                                      • Part of subcall function 0035C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0035C625
                                    • Sleep.KERNEL32(000001F4), ref: 0034A5AE
                                    • Sleep.KERNEL32(00000064), ref: 0034A638
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Window$SleepText$ForegroundLength
                                    • String ID: [ $ ]
                                    • API String ID: 3309952895-93608704
                                    • Opcode ID: 70897c6e74eb7933f5d46403537797cedeafdc72b35d7489529f48b6504dd7a4
                                    • Instruction ID: d3a359c56c3cbafc350932699d2fa7f5e6acbba8f452eb8a417fd406bf8a0d55
                                    • Opcode Fuzzy Hash: 70897c6e74eb7933f5d46403537797cedeafdc72b35d7489529f48b6504dd7a4
                                    • Instruction Fuzzy Hash: 1511CD315007006BC61AFB74CD53AAFBBECAF51300F40092EF5925E5E2FF25BA098692
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fe2d084d22170f665203c480a05556500588b402fb68f15dae3c8ab3ca50a20c
                                    • Instruction ID: 9c9c5d18316c0202afd5729e911f272a4d84e27aa49a91d2dea476d44ac1417a
                                    • Opcode Fuzzy Hash: fe2d084d22170f665203c480a05556500588b402fb68f15dae3c8ab3ca50a20c
                                    • Instruction Fuzzy Hash: 2601F2F26097193EFA233A786CC2F67634DCB51FB8B3107AAB120592D1DBA58E004320
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1bc2510e958e61bd6709863993b97428591812f6a6dfa901249625339fecc2a6
                                    • Instruction ID: 648b22ec0a2e1548d408a4ba4c7c4c3f1504d4c07617e5c83369984ec0fdfc33
                                    • Opcode Fuzzy Hash: 1bc2510e958e61bd6709863993b97428591812f6a6dfa901249625339fecc2a6
                                    • Instruction Fuzzy Hash: 0D01ADF22097163EEA233A7C6CC2D27634CDB51BB832603AAF421562D1EF308E054360
                                    APIs
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0038858D,00000000,00000000,00000000,00000000,?,003888B9,00000006,FlsSetValue), ref: 00388618
                                    • GetLastError.KERNEL32(?,0038858D,00000000,00000000,00000000,00000000,?,003888B9,00000006,FlsSetValue,0039F170,0039F178,00000000,00000364,?,00388367), ref: 00388624
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0038858D,00000000,00000000,00000000,00000000,?,003888B9,00000006,FlsSetValue,0039F170,0039F178,00000000), ref: 00388632
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad$ErrorLast
                                    • String ID:
                                    • API String ID: 3177248105-0
                                    • Opcode ID: 90769938925c510f3a5065fabb09cf656826f9699354440bd4184a44b5028620
                                    • Instruction ID: e1f309422661b6fed85a56088611ec1cc4f048292eabf880bdebd09c32661762
                                    • Opcode Fuzzy Hash: 90769938925c510f3a5065fabb09cf656826f9699354440bd4184a44b5028620
                                    • Instruction Fuzzy Hash: 7001FC32602326ABCB23AB78DC45A57775CAF44BA1F610A66FB05D3140EF22D800C7E4
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0034A87E), ref: 0035C52F
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0035C543
                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0035C568
                                    • CloseHandle.KERNEL32(00000000), ref: 0035C576
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleReadSize
                                    • String ID:
                                    • API String ID: 3919263394-0
                                    • Opcode ID: a490694c5f1be673ff1540debcee8774fd57daa748dbcb7c6d2fe64cb116578f
                                    • Instruction ID: 717a8d1fc839224ac55180f7e4b114c1f369379a0d10e69e2eebe566039a2a09
                                    • Opcode Fuzzy Hash: a490694c5f1be673ff1540debcee8774fd57daa748dbcb7c6d2fe64cb116578f
                                    • Instruction Fuzzy Hash: CAF0F6B12012087FE6121F29ADC5FBB37DCDB877A9F11062FFC41A22D0DA225D095131
                                    APIs
                                    • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0035C286
                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0035C299
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0035C2C4
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0035C2CC
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandleOpenProcess
                                    • String ID:
                                    • API String ID: 39102293-0
                                    • Opcode ID: d4d35b91ed73fb65579fde7401f889f18429bd58c5536093e96b4166f0777866
                                    • Instruction ID: 8c2384e30cb03d660d71f8bbdf947c604533c7b346219084689a2eaf0742cf4e
                                    • Opcode Fuzzy Hash: d4d35b91ed73fb65579fde7401f889f18429bd58c5536093e96b4166f0777866
                                    • Instruction Fuzzy Hash: 600149312003156FDB1367D89C8AF77B37CCB4475AF01012BFE58D22B1EEA18D454661
                                    APIs
                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 003798FA
                                      • Part of subcall function 00379F32: ___AdjustPointer.LIBCMT ref: 00379F7C
                                    • _UnwindNestedFrames.LIBCMT ref: 00379911
                                    • ___FrameUnwindToState.LIBVCRUNTIME ref: 00379923
                                    • CallCatchBlock.LIBVCRUNTIME ref: 00379947
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                    • String ID:
                                    • API String ID: 2633735394-0
                                    • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                    • Instruction ID: bb90baf63a1fba4679854cc384c65fd1e888d1e5151a12b3482561936f83d01a
                                    • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                    • Instruction Fuzzy Hash: F701D732000109BBDF229F55CC01EDA3BBAFF49754F16821AFA5C65121C33AE862DBA0
                                    APIs
                                    • GetSystemMetrics.USER32(0000004C), ref: 0035942B
                                    • GetSystemMetrics.USER32(0000004D), ref: 00359431
                                    • GetSystemMetrics.USER32(0000004E), ref: 00359437
                                    • GetSystemMetrics.USER32(0000004F), ref: 0035943D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: MetricsSystem
                                    • String ID:
                                    • API String ID: 4116985748-0
                                    • Opcode ID: 53a8c98af5c1a72f63075f15345fdada22e9958935618408b3b8da1cf57fd285
                                    • Instruction ID: a33a8c317458d86a32addcb005e9a0c3c1dda519b2f5a3ce1fe6cfeaf5055243
                                    • Opcode Fuzzy Hash: 53a8c98af5c1a72f63075f15345fdada22e9958935618408b3b8da1cf57fd285
                                    • Instruction Fuzzy Hash: B8F0A4A1B043154BD702EF768C51F2B6AD59BD4361F10083FFA088B291EEA4DC0A8B80
                                    APIs
                                      • Part of subcall function 00374801: __onexit.LIBCMT ref: 00374807
                                    • __Init_thread_footer.LIBCMT ref: 0034B7D2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Init_thread_footer__onexit
                                    • String ID: [End of clipboard]$[Text copied to clipboard]
                                    • API String ID: 1881088180-3686566968
                                    • Opcode ID: 477c97ad37bdb60008731c91fffed75bece8feb5e4c5b37af3cff9394492fbf0
                                    • Instruction ID: 280bb8c84f2539371df8813e22489b22f18cf12ba0e4310db581c7a5fbe0fc50
                                    • Opcode Fuzzy Hash: 477c97ad37bdb60008731c91fffed75bece8feb5e4c5b37af3cff9394492fbf0
                                    • Instruction Fuzzy Hash: 31216F31A006088ACB16FBA5D893DEDB7B9AF54310F500539F5066F592EF34BD4ACA80
                                    APIs
                                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00391E12,?,00000050,?,?,?,?,?), ref: 00391C92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: ACP$OCP
                                    • API String ID: 0-711371036
                                    • Opcode ID: 86e42eec423d15de610f87b45e36db159a21e562e1a3d0b61292d07f9af3d7e4
                                    • Instruction ID: e0e8e9a2bed9a26cba3950f159490e5d32c56f5e6cade161c5c7221aba1f8811
                                    • Opcode Fuzzy Hash: 86e42eec423d15de610f87b45e36db159a21e562e1a3d0b61292d07f9af3d7e4
                                    • Instruction Fuzzy Hash: 6521F862A8020BA6DF369F54C941BAB73AAEF54B51F578464E90AF7200F732DD41CB50
                                    APIs
                                    • Sleep.KERNEL32 ref: 0035667B
                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 003566DD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DownloadFileSleep
                                    • String ID: !D4
                                    • API String ID: 1931167962-1936690033
                                    • Opcode ID: f1ce252fe8e5948fc308dd14ca054f28992414b2a03a6668cbafebd3d3b56b66
                                    • Instruction ID: a95f45c17d11a1c775eb9c58e853c51fe7a24ea1beb3cfc3f3110d401a394321
                                    • Opcode Fuzzy Hash: f1ce252fe8e5948fc308dd14ca054f28992414b2a03a6668cbafebd3d3b56b66
                                    • Instruction Fuzzy Hash: CF1163716087419AC716FF70D8A69BE77E8AF50700F400D1DF5424F192EE30A98DC752
                                    APIs
                                    • GetLocalTime.KERNEL32(00000000), ref: 0035B59A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocalTime
                                    • String ID: | $%02i:%02i:%02i:%03i
                                    • API String ID: 481472006-2430845779
                                    • Opcode ID: d55b6269ed776d036220b9e868e3379a5f700dbcbff58e04bde23ddcf5dc5a96
                                    • Instruction ID: f1b2a82fae13e9b8f6ff94383b45f3f5ea603fee9a54450744727bee353481b3
                                    • Opcode Fuzzy Hash: d55b6269ed776d036220b9e868e3379a5f700dbcbff58e04bde23ddcf5dc5a96
                                    • Instruction Fuzzy Hash: 391163715182445AC306EF65D8529FFB3E8AB44300F500A1DF8968E1E1EF34EA89C656
                                    APIs
                                      • Part of subcall function 0034B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0034B1AD
                                      • Part of subcall function 0034B19F: wsprintfW.USER32 ref: 0034B22E
                                      • Part of subcall function 0035B580: GetLocalTime.KERNEL32(00000000), ref: 0035B59A
                                    • CloseHandle.KERNEL32(?), ref: 0034B0EF
                                    • UnhookWindowsHookEx.USER32 ref: 0034B102
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                    • String ID: Online Keylogger Stopped
                                    • API String ID: 1623830855-1496645233
                                    • Opcode ID: dfbf5c7791d5a45205b50feaca72b67120b17f150ee279e0acc934cf47a490e6
                                    • Instruction ID: 913003ca2d68cb8c0d6193763ddbbaef17e93f88f6d3497afb6b5f569f79c2e4
                                    • Opcode Fuzzy Hash: dfbf5c7791d5a45205b50feaca72b67120b17f150ee279e0acc934cf47a490e6
                                    • Instruction Fuzzy Hash: 4801D8356005009BD7237B39C81BBBEFBF59B42300F80045DE8421E592EB617859CBD2
                                    APIs
                                    • waveInPrepareHeader.WINMM(?,00000020,?,?,003B6B50,003B4EE0,?,00000000,00341A15), ref: 00341849
                                    • waveInAddBuffer.WINMM(?,00000020,?,00000000,00341A15), ref: 0034185F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: wave$BufferHeaderPrepare
                                    • String ID: XM;
                                    • API String ID: 2315374483-1764916854
                                    • Opcode ID: 58b6e14c712b8d582a16ca4deb2c0d2fed27cb451aa50597a79a2c7889b8e647
                                    • Instruction ID: b6cdc538117c5577742c81b2d0ccf1ce7aa1cad2c980f7570ecbea4c42847b65
                                    • Opcode Fuzzy Hash: 58b6e14c712b8d582a16ca4deb2c0d2fed27cb451aa50597a79a2c7889b8e647
                                    • Instruction Fuzzy Hash: D5016275700611AFD7129F29EC44A66BBEDFB49358B01072AFA05CB762DF31AC518B60
                                    APIs
                                    • IsValidLocale.KERNEL32(00000000,kK8,00000000,00000001,?,?,00384B6B,?,?,?,?,00000004), ref: 00388BB2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocaleValid
                                    • String ID: IsValidLocaleName$kK8
                                    • API String ID: 1901932003-2607404299
                                    • Opcode ID: 7d64406759602442ce06fca3a9ca9c16facc86c27d077f28101442531421a2ec
                                    • Instruction ID: 5e09652e345ae07005c08caef9cb5bae200f0cabf3c2142c8d8055be08da9c3a
                                    • Opcode Fuzzy Hash: 7d64406759602442ce06fca3a9ca9c16facc86c27d077f28101442531421a2ec
                                    • Instruction Fuzzy Hash: ACF0E970681308FBCB137B64DC06F9E7B58DB44711F5101A6FD05AA190DE715E1086D4
                                    APIs
                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0034C531
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                    • API String ID: 1174141254-4188645398
                                    • Opcode ID: c47e08df25b07a8eebea2c962b52f285940f60b6013e55e16dfbb3ef33aa7a47
                                    • Instruction ID: 4042f39c30c4a423ab2e6b8e122e31b768bfbd41cf53b416143437429341fb0e
                                    • Opcode Fuzzy Hash: c47e08df25b07a8eebea2c962b52f285940f60b6013e55e16dfbb3ef33aa7a47
                                    • Instruction Fuzzy Hash: 42F08230A00219968B16FBB9DC479FF7BACDD11750B40016AF6059E1C2EE50B94686D0
                                    APIs
                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0034C594
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                    • API String ID: 1174141254-2800177040
                                    • Opcode ID: c903899fbcfe7f7a3c773655e6b2540e979abb21a274db58e509e14e69d51886
                                    • Instruction ID: a5e2908a818247157155fd01d16f5f330b500984ffb4f6463ded1fcddbd3fefd
                                    • Opcode Fuzzy Hash: c903899fbcfe7f7a3c773655e6b2540e979abb21a274db58e509e14e69d51886
                                    • Instruction Fuzzy Hash: 66F08230A00219968B06FAB9DC478EFBFACDD11750B400166B6055E1C2EE50B94686E0
                                    APIs
                                    • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0034C5F7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: AppData$\Opera Software\Opera Stable\
                                    • API String ID: 1174141254-1629609700
                                    • Opcode ID: 9a4d775f1b392ba6f405ec0e118d5c24f3324d1a01fd8bc48946d9cdad57ea48
                                    • Instruction ID: 057985516607f81b96ece5869779d052241f90e4775b4e0f0c0f3ef5858c5205
                                    • Opcode Fuzzy Hash: 9a4d775f1b392ba6f405ec0e118d5c24f3324d1a01fd8bc48946d9cdad57ea48
                                    • Instruction Fuzzy Hash: 8DF08230A50219968A16FBB4DC478EF7BACDD10751F441166F605AE0C2EF54B845C6E0
                                    APIs
                                    • GetKeyState.USER32(00000011), ref: 0034B686
                                      • Part of subcall function 0034A41B: GetForegroundWindow.USER32(?,?,00000000), ref: 0034A451
                                      • Part of subcall function 0034A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0034A45D
                                      • Part of subcall function 0034A41B: GetKeyboardLayout.USER32(00000000), ref: 0034A464
                                      • Part of subcall function 0034A41B: GetKeyState.USER32(00000010), ref: 0034A46E
                                      • Part of subcall function 0034A41B: GetKeyboardState.USER32(?,?,00000000), ref: 0034A479
                                      • Part of subcall function 0034A41B: ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0034A49C
                                      • Part of subcall function 0034A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0034A4FC
                                      • Part of subcall function 0034A671: SetEvent.KERNEL32(?,?,00000000,0034B245,00000000), ref: 0034A69D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                    • String ID: [AltL]$[AltR]
                                    • API String ID: 2738857842-2658077756
                                    • Opcode ID: 8c829f5a25d3efc34bb822a625bb8b5848c3195dcd93dc884c5166610b32964c
                                    • Instruction ID: dfa4c85911346527f6b9aa0714cc38f5e5cd5b6dc6fe9a0f5f5f672322936c44
                                    • Opcode Fuzzy Hash: 8c829f5a25d3efc34bb822a625bb8b5848c3195dcd93dc884c5166610b32964c
                                    • Instruction Fuzzy Hash: E0E0E52134062002C85B363D192B6BE2D908B42B60B47010DF4438F6D5DA9EA94143C7
                                    APIs
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 003561E3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID: !D4$open
                                    • API String ID: 587946157-3458497548
                                    • Opcode ID: 16a70d86edb1b3f3925ffb681cf2f61d925f03378b76cdc72c5b1d153e96e70b
                                    • Instruction ID: 8d9864ff8112bc586b267df25923b08b195f1052079619d812029e9a93b2b86b
                                    • Opcode Fuzzy Hash: 16a70d86edb1b3f3925ffb681cf2f61d925f03378b76cdc72c5b1d153e96e70b
                                    • Instruction Fuzzy Hash: 2CE092712482045AD256FE70DC92EFEB3DCEB50700F800D2EF5064E4D2EF30688D8221
                                    APIs
                                    • GetKeyState.USER32(00000012), ref: 0034B6E0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State
                                    • String ID: [CtrlL]$[CtrlR]
                                    • API String ID: 1649606143-2446555240
                                    • Opcode ID: 9f23dad7d7355ed33ba7dd132b5ee5256856ca1682232a47be6aa6a7dd8170a9
                                    • Instruction ID: 91bba88934330a4934ed586692f453ab7d7057e23e44cac232526a19ef2b1fe4
                                    • Opcode Fuzzy Hash: 9f23dad7d7355ed33ba7dd132b5ee5256856ca1682232a47be6aa6a7dd8170a9
                                    • Instruction Fuzzy Hash: 0BE0862174061013C5263A7D561F6BE7E90CF82760F45011DF4834F6C6CB56E90052D2
                                    APIs
                                      • Part of subcall function 00374801: __onexit.LIBCMT ref: 00374807
                                    • __Init_thread_footer.LIBCMT ref: 00350F64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Init_thread_footer__onexit
                                    • String ID: ,k;$0k;
                                    • API String ID: 1881088180-495615017
                                    • Opcode ID: 981c796173233cd19000c05156f11d1615896e88a98c66d765419af2af59e1d5
                                    • Instruction ID: 6b37236d0ba8569fe13c4e409749480027e83d4d0b1d1fa57a84071ef94edf42
                                    • Opcode Fuzzy Hash: 981c796173233cd19000c05156f11d1615896e88a98c66d765419af2af59e1d5
                                    • Instruction Fuzzy Hash: 6FE0D8325145109BC92BE72AA443D9937A89B09325B204126F505DB6E3CB5F690545D5
                                    APIs
                                    • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0034B8B1
                                    • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0034B8DC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteDirectoryFileRemove
                                    • String ID: pth_unenc
                                    • API String ID: 3325800564-4028850238
                                    • Opcode ID: 330123dbae820d4f402325efade9d843f6cf455a5309c515b9a50a9235b0f279
                                    • Instruction ID: 9daa0f8aa32f46843cd9f3ad026e6f5da9a2cf303393b9ea458d8c9839862362
                                    • Opcode Fuzzy Hash: 330123dbae820d4f402325efade9d843f6cf455a5309c515b9a50a9235b0f279
                                    • Instruction Fuzzy Hash: 0BE08C31000A205BDA12BB38CC95BDA37ECAF05311F040A1BE4E3DB121DF21B88ED650
                                    APIs
                                    • TerminateProcess.KERNEL32(00000000,pth_unenc,0034F903), ref: 0035289B
                                    • WaitForSingleObject.KERNEL32(000000FF), ref: 003528AE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ObjectProcessSingleTerminateWait
                                    • String ID: pth_unenc
                                    • API String ID: 1872346434-4028850238
                                    • Opcode ID: 26ed8c207702ae604303fc99fb7e879e3c00fe087dc32b7c5a7bc8a23697a0de
                                    • Instruction ID: 8f7658fbe0edadd36b30ce0c8d458117df2dcc94fc4ec07843ddfa498b392486
                                    • Opcode Fuzzy Hash: 26ed8c207702ae604303fc99fb7e879e3c00fe087dc32b7c5a7bc8a23697a0de
                                    • Instruction Fuzzy Hash: 79D01235149316BFE7331F64ED48B463B5C9705329F10030FF671512F0C7264454AB10
                                    APIs
                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 00351BC7
                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 00351C93
                                    • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00351CB5
                                    • SetLastError.KERNEL32(0000007E,00351F2B), ref: 00351CCC
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.3315718794.0000000000340000.00000040.00000001.00040000.00000000.sdmp, Offset: 00340000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_340000_iexplore.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastRead
                                    • String ID:
                                    • API String ID: 4100373531-0
                                    • Opcode ID: 17ecb208376d479631f7d19bc8e378a13d15b0260cf315c4a03cb5c5e30e0291
                                    • Instruction ID: 69b274efc7eb8c575b5565808f524ec2b3248044f380e0f052e531a69c6b2634
                                    • Opcode Fuzzy Hash: 17ecb208376d479631f7d19bc8e378a13d15b0260cf315c4a03cb5c5e30e0291
                                    • Instruction Fuzzy Hash: 7F419D716443059FE7268F19DC84F66B3E8FF48716F01042EE95A87A61E772E808CB11