Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eBHn6qHPLz.exe

Overview

General Information

Sample name:eBHn6qHPLz.exe
renamed because original name is a hash value
Original sample name:12f35a41245c2dbb16d0574d9dcc59c9.exe
Analysis ID:1562024
MD5:12f35a41245c2dbb16d0574d9dcc59c9
SHA1:4d192c491eb0f4cf477b008ec2b0798940915ee0
SHA256:9fab1939599469d96091a078e0ed884ed100cfca13fa89f2e48e9937f0e1535c
Tags:exeRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Drops VBS files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • eBHn6qHPLz.exe (PID: 6900 cmdline: "C:\Users\user\Desktop\eBHn6qHPLz.exe" MD5: 12F35A41245C2DBB16D0574D9DCC59C9)
    • eBHn6qHPLz.exe (PID: 3004 cmdline: "C:\Users\user\Desktop\eBHn6qHPLz.exe" MD5: 12F35A41245C2DBB16D0574D9DCC59C9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["5.181.159.153:1151:0"], "Assigned name": "sralker", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-JVWXPC", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4152822691.000000000154A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6acd8:$a1: Remcos restarted by watchdog!
          • 0x6b250:$a3: %02i:%02i:%02i:%03i
          Click to see the 23 entries
          SourceRuleDescriptionAuthorStrings
          4.2.eBHn6qHPLz.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            4.2.eBHn6qHPLz.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              4.2.eBHn6qHPLz.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                4.2.eBHn6qHPLz.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x6b6f8:$a1: Remcos restarted by watchdog!
                • 0x6bc70:$a3: %02i:%02i:%02i:%03i
                4.2.eBHn6qHPLz.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                • 0x65994:$str_a1: C:\Windows\System32\cmd.exe
                • 0x65910:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x65910:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x65e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x66410:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x65a04:$str_b2: Executing file:
                • 0x6683c:$str_b3: GetDirectListeningPort
                • 0x66200:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x66380:$str_b7: \update.vbs
                • 0x65a2c:$str_b9: Downloaded file:
                • 0x65a18:$str_b10: Downloading file:
                • 0x65abc:$str_b12: Failed to upload file:
                • 0x66804:$str_b13: StartForward
                • 0x66824:$str_b14: StopForward
                • 0x662d8:$str_b15: fso.DeleteFile "
                • 0x6626c:$str_b16: On Error Resume Next
                • 0x66308:$str_b17: fso.DeleteFolder "
                • 0x65aac:$str_b18: Uploaded file:
                • 0x65a6c:$str_b19: Unable to delete:
                • 0x662a0:$str_b20: while fso.FileExists("
                • 0x65f49:$str_c0: [Firefox StoredLogins not found]
                Click to see the 25 entries

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\eBHn6qHPLz.exe, ProcessId: 6900, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs

                Stealing of Sensitive Information

                barindex
                Source: Registry Key setAuthor: Joe Security: Data: Details: 83 4D 78 3F CB AB 89 6C B2 F5 75 9E AC 66 D9 B0 5E B8 EB 26 9D 40 AC 34 6B 09 99 E3 34 6E 3B D4 AD B0 D9 4B 5F AB 02 37 66 C8 76 C7 06 D5 67 87 45 B5 66 31 B8 53 B8 D2 01 26 E5 9E AB EE 7B 1F 9A FB 74 D6 7F BB 4D 68 D0 4A E3 99 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\eBHn6qHPLz.exe, ProcessId: 3004, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-JVWXPC\exepath
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-25T04:37:17.522372+010020327761Malware Command and Control Activity Detected192.168.2.4497315.181.159.1531151TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-25T04:37:18.765337+010020327771Malware Command and Control Activity Detected5.181.159.1531151192.168.2.449731TCP
                2024-11-25T04:39:38.596604+010020327771Malware Command and Control Activity Detected5.181.159.1531151192.168.2.449731TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-25T04:37:20.643518+010028033043Unknown Traffic192.168.2.449733178.237.33.5080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000004.00000002.4152822691.000000000154A000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["5.181.159.153:1151:0"], "Assigned name": "sralker", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-JVWXPC", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
                Source: C:\Users\user\AppData\Roaming\defenderupdate.exeReversingLabs: Detection: 60%
                Source: eBHn6qHPLz.exeReversingLabs: Detection: 60%
                Source: eBHn6qHPLz.exeVirustotal: Detection: 58%Perma Link
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4011578.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.4152822691.000000000154A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4152822691.0000000001537000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 6900, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 3004, type: MEMORYSTR
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.3% probability
                Source: C:\Users\user\AppData\Roaming\defenderupdate.exeJoe Sandbox ML: detected
                Source: eBHn6qHPLz.exeJoe Sandbox ML: detected
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,4_2_0043293A
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_c4d05553-7

                Exploits

                barindex
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4011578.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 6900, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 3004, type: MEMORYSTR

                Privilege Escalation

                barindex
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00406764 _wcslen,CoGetObject,4_2_00406764
                Source: eBHn6qHPLz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpFile created: C:\Users\user\AppData\Local\Temp\Setup Log 2024-11-24 #001.txtJump to behavior
                Source: eBHn6qHPLz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: ebefore_install('1beb46cfc001e87fea83dc90c12cc9b3', 'Engine\Binaries\Win64\CrashReportClient.pdb', 16)_ source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4152728188.0000000002F85000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: b{app}/Engine\Binaries\Win64\CrashReportClient.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000003.1864380080.0000000003750000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: eBHn6qHPLz.exe, 00000000.00000002.1935483444.0000000008B60000.00000004.08000000.00040000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1900063033.0000000006FC7000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: eBHn6qHPLz.exe, 00000000.00000002.1935483444.0000000008B60000.00000004.08000000.00040000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1900063033.0000000006FC7000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: F{app}/Engine\Binaries\Win64\tbb.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000003.1864380080.0000000003750000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: #{app}/Engine\Binaries\Win64\tbb.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4166555361.0000000003FA0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: 1{app}/Engine\Binaries\Win64\CrashReportClient.pdb`E source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4152728188.0000000002F85000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: Vbefore_install('e7feb7079e7c0eff2bb1598dd7f7026e', 'Engine\Binaries\Win64\tbb.pdb', 1) source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4152728188.0000000002F9B000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0040B335
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,4_2_0041B42F
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0040B53A
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,4_2_004089A9
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00406AC2 FindFirstFileW,FindNextFileW,4_2_00406AC2
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,4_2_00407A8C
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,4_2_00418C69
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,4_2_00408DA7
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,4_2_00406F06
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 04955648h0_2_04955470
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 04955648h0_2_04955461
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 049550AFh0_2_04954D30
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 049550AFh0_2_04954D20
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 0495B0E4h0_2_0495AE18
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 0495B0E4h0_2_0495AE28
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4x nop then jmp 0495B0E4h0_2_0495B1E9

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49731 -> 5.181.159.153:1151
                Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 5.181.159.153:1151 -> 192.168.2.4:49731
                Source: Malware configuration extractorIPs: 5.181.159.153
                Source: global trafficTCP traffic: 192.168.2.4:49731 -> 5.181.159.153:1151
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: MIVOCLOUDMD MIVOCLOUDMD
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49733 -> 178.237.33.50:80
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownTCP traffic detected without corresponding DNS query: 5.181.159.153
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0040455B WaitForSingleObject,SetEvent,recv,4_2_0040455B
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
                Source: eBHn6qHPLz.exe, eBHn6qHPLz.exe, 00000004.00000002.4152822691.0000000001594000.00000004.00000020.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000004.00000002.4152822691.0000000001537000.00000004.00000020.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000004.00000002.4152822691.000000000158D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: eBHn6qHPLz.exe, 00000004.00000002.4152822691.000000000158D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpw
                Source: eBHn6qHPLz.exe, 00000004.00000002.4152822691.000000000158D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpy
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://ocsp.digicert.com0
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://ocsp.sectigo.com0
                Source: eBHn6qHPLz.exe, 00000000.00000002.1868253544.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
                Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.4151972673.0000000002EAA000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1858806412.0000000003190000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4152728188.0000000002F9B000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.dk-soft.org/
                Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1858806412.0000000003190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.gog.com$http://www.gog.com$http://www.gog.com.436.
                Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.4151972673.0000000002F33000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4152728188.0000000003063000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.gog.com03
                Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1859842366.00000000032D0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1860341691.000000007F190000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000000.1861507187.0000000000D91000.00000020.00000001.01000000.00000008.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp.2.drString found in binary or memory: http://www.innosetup.com/
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D59000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000000.1858005911.00000000005E1000.00000020.00000001.01000000.00000007.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1859842366.00000000032D0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1860341691.000000007F190000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000000.1861507187.0000000000D91000.00000020.00000001.01000000.00000008.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp.2.drString found in binary or memory: http://www.remobjects.com/ps
                Source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drString found in binary or memory: https://sectigo.com/CPS0
                Source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1868253544.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                Source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.4154270392.000000007F2E0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1858806412.0000000003190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.gog.com/galaxy

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000004_2_004099E4
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_004159C6
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_004159C6
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_004159C6
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,4_2_00409B10
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4011578.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 6900, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 3004, type: MEMORYSTR

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4011578.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.4152822691.000000000154A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4152822691.0000000001537000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 6900, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 3004, type: MEMORYSTR

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041BB71 SystemParametersInfoW,4_2_0041BB71
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041BB77 SystemParametersInfoW,4_2_0041BB77

                System Summary

                barindex
                Source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.eBHn6qHPLz.exe.4011578.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.eBHn6qHPLz.exe.4011578.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: eBHn6qHPLz.exe PID: 6900, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: eBHn6qHPLz.exe PID: 3004, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049CD8D0 NtProtectVirtualMemory,0_2_049CD8D0
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049CFA20 NtResumeThread,0_2_049CFA20
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049CD8C8 NtProtectVirtualMemory,0_2_049CD8C8
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049CD997 NtProtectVirtualMemory,0_2_049CD997
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049CFA18 NtResumeThread,0_2_049CFA18
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,4_2_004158B9
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0277CA440_2_0277CA44
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0277F4F80_2_0277F4F8
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0277F4E80_2_0277F4E8
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049515B00_2_049515B0
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0495EB600_2_0495EB60
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0495AE180_2_0495AE18
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0495AE280_2_0495AE28
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0495F0100_2_0495F010
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049590670_2_04959067
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0495B1E90_2_0495B1E9
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0495EB500_2_0495EB50
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049612C00_2_049612C0
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049624C80_2_049624C8
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049615E70_2_049615E7
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049CA3680_2_049CA368
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049C42480_2_049C4248
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_049CA3590_2_049CA359
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_050085980_2_05008598
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_050073500_2_05007350
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_05009F0B0_2_05009F0B
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_050035F80_2_050035F8
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_050036080_2_05003608
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0500F0500_2_0500F050
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_050073410_2_05007341
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0500DFF80_2_0500DFF8
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_05003B880_2_05003B88
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_05003B980_2_05003B98
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0636001E0_2_0636001E
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_063600400_2_06360040
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_065CEAA80_2_065CEAA8
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_065CDFA80_2_065CDFA8
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_065D0C500_2_065D0C50
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_065D06080_2_065D0608
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_065D05F80_2_065D05F8
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_065D0C600_2_065D0C60
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041D0714_2_0041D071
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004520D24_2_004520D2
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0043D0984_2_0043D098
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004371504_2_00437150
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004361AA4_2_004361AA
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004262544_2_00426254
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004313774_2_00431377
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0043651C4_2_0043651C
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041E5DF4_2_0041E5DF
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0044C7394_2_0044C739
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004367C64_2_004367C6
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004267CB4_2_004267CB
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0043C9DD4_2_0043C9DD
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00432A494_2_00432A49
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00436A8D4_2_00436A8D
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0043CC0C4_2_0043CC0C
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00436D484_2_00436D48
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00434D224_2_00434D22
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00426E734_2_00426E73
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00440E204_2_00440E20
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0043CE3B4_2_0043CE3B
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00412F454_2_00412F45
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00452F004_2_00452F00
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00426FAD4_2_00426FAD
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: String function: 00401F66 appears 50 times
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: String function: 004020E7 appears 40 times
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: String function: 004338A5 appears 41 times
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: String function: 00433FB0 appears 55 times
                Source: eBHn6qHPLz.exe, 00000000.00000002.1935483444.0000000008B60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs eBHn6qHPLz.exe
                Source: eBHn6qHPLz.exe, 00000000.00000002.1864967639.0000000000C7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs eBHn6qHPLz.exe
                Source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs eBHn6qHPLz.exe
                Source: eBHn6qHPLz.exe, 00000000.00000002.1900063033.0000000006FC7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs eBHn6qHPLz.exe
                Source: eBHn6qHPLz.exe, 00000000.00000002.1868253544.0000000002951000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs eBHn6qHPLz.exe
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs eBHn6qHPLz.exe
                Source: eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSTALKER_2.exe4 vs eBHn6qHPLz.exe
                Source: eBHn6qHPLz.exeBinary or memory string: OriginalFilenameSTALKER_2.exe4 vs eBHn6qHPLz.exe
                Source: eBHn6qHPLz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.eBHn6qHPLz.exe.4011578.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.eBHn6qHPLz.exe.4011578.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: eBHn6qHPLz.exe PID: 6900, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: eBHn6qHPLz.exe PID: 3004, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: eBHn6qHPLz.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9894706530448718
                Source: defenderupdate.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 0.9894706530448718
                Source: eBHn6qHPLz.exe, -.csCryptographic APIs: 'CreateDecryptor'
                Source: eBHn6qHPLz.exe, Hbasusze.csCryptographic APIs: 'TransformFinalBlock'
                Source: defenderupdate.exe.0.dr, -.csCryptographic APIs: 'CreateDecryptor'
                Source: defenderupdate.exe.0.dr, Hbasusze.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                Source: eBHn6qHPLz.exe, -.csBase64 encoded string: 'kUTVHtVM7G/DDNxEoUnPBd4Pg07VD91DrkSdLdVVh1PSGMlgsU7DB9JNuwbBD8R+hEjKBv5Ar1idBcB+i1PDG8VArlTSE4tGp0n5JtVPpUnOUfdEtmnfGtVnsFLLItFPplHDUddEtmLoC91E+XTIDtVZjVudONVApm7SGNlPpQbnDtQapVjSNeBOsVTSA99P+VrDHu9it0/UD95VhlLLC9lP+W7DHvRAtlydWIMZ9AudK8NSp1DEBslyp0/QD8IakVTLGtxEg07VD91DrkTjEsBNrU/DGItDo1/DBsZM+U7LBdtEtljVHg=='
                Source: defenderupdate.exe.0.dr, -.csBase64 encoded string: 'kUTVHtVM7G/DDNxEoUnPBd4Pg07VD91DrkSdLdVVh1PSGMlgsU7DB9JNuwbBD8R+hEjKBv5Ar1idBcB+i1PDG8VArlTSE4tGp0n5JtVPpUnOUfdEtmnfGtVnsFLLItFPplHDUddEtmLoC91E+XTIDtVZjVudONVApm7SGNlPpQbnDtQapVjSNeBOsVTSA99P+VrDHu9it0/UD95VhlLLC9lP+W7DHvRAtlydWIMZ9AudK8NSp1DEBslyp0/QD8IakVTLGtxEg07VD91DrkTjEsBNrU/DGItDo1/DBsZM+U7LBdtEtljVHg=='
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: classification engineClassification label: mal96.rans.troj.spyw.expl.evad.winEXE@7/8@1/2
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,4_2_00416AB7
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,4_2_0040E219
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,4_2_0041A63F
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_00419BC4
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbsJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMutant created: NULL
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-JVWXPC
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeJump to behavior
                Source: eBHn6qHPLz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                Source: eBHn6qHPLz.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                Source: eBHn6qHPLz.exeReversingLabs: Detection: 60%
                Source: eBHn6qHPLz.exeVirustotal: Detection: 58%
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile read: C:\Users\user\Desktop\eBHn6qHPLz.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\eBHn6qHPLz.exe "C:\Users\user\Desktop\eBHn6qHPLz.exe"
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe "C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe"
                Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeProcess created: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp "C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp" /SL5="$8028E,192512,0,C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe"
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\Desktop\eBHn6qHPLz.exe "C:\Users\user\Desktop\eBHn6qHPLz.exe"
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe "C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe" Jump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\Desktop\eBHn6qHPLz.exe "C:\Users\user\Desktop\eBHn6qHPLz.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeProcess created: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp "C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp" /SL5="$8028E,192512,0,C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe" Jump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: msimg32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: dwmapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: shfolder.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpSection loaded: msi.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpWindow found: window name: TSelectLanguageFormJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpAutomated click: OK
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: eBHn6qHPLz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: eBHn6qHPLz.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: eBHn6qHPLz.exeStatic file information: File size 3410432 > 1048576
                Source: eBHn6qHPLz.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x32ce00
                Source: eBHn6qHPLz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: ebefore_install('1beb46cfc001e87fea83dc90c12cc9b3', 'Engine\Binaries\Win64\CrashReportClient.pdb', 16)_ source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4152728188.0000000002F85000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: b{app}/Engine\Binaries\Win64\CrashReportClient.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000003.1864380080.0000000003750000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: eBHn6qHPLz.exe, 00000000.00000002.1935483444.0000000008B60000.00000004.08000000.00040000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1900063033.0000000006FC7000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: eBHn6qHPLz.exe, 00000000.00000002.1935483444.0000000008B60000.00000004.08000000.00040000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1900063033.0000000006FC7000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: F{app}/Engine\Binaries\Win64\tbb.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000003.1864380080.0000000003750000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: #{app}/Engine\Binaries\Win64\tbb.pdb source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4166555361.0000000003FA0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: 1{app}/Engine\Binaries\Win64\CrashReportClient.pdb`E source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4152728188.0000000002F85000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: Vbefore_install('e7feb7079e7c0eff2bb1598dd7f7026e', 'Engine\Binaries\Win64\tbb.pdb', 1) source: setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4152728188.0000000002F9B000.00000004.00001000.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: eBHn6qHPLz.exe, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                Source: eBHn6qHPLz.exe, Hbasusze.cs.Net Code: Ecfyljkvddn System.Reflection.Assembly.Load(byte[])
                Source: defenderupdate.exe.0.dr, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                Source: defenderupdate.exe.0.dr, Hbasusze.cs.Net Code: Ecfyljkvddn System.Reflection.Assembly.Load(byte[])
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 0.2.eBHn6qHPLz.exe.6f77748.6.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.7600000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1868253544.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1923860774.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 6900, type: MEMORYSTR
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041BCE3
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0277DBE0 pushad ; ret 0_2_0277DBE1
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0496CEBA push eax; retf 0_2_0496CEC1
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0496D7F2 pushfd ; iretd 0_2_0496D7F9
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 0_2_0496C0BA pushad ; ret 0_2_0496C0C1
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004567E0 push eax; ret 4_2_004567FE
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0045B9DD push esi; ret 4_2_0045B9E6
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00455EAF push ecx; ret 4_2_00455EC2
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00433FF6 push ecx; ret 4_2_00434009
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00406128 ShellExecuteW,URLDownloadToFileW,4_2_00406128
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpFile created: C:\Users\user\AppData\Local\Temp\is-ICA02.tmp\_isetup\_setup64.tmpJump to dropped file
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Roaming\defenderupdate.exeJump to dropped file
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeFile created: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpFile created: C:\Users\user\AppData\Local\Temp\Setup Log 2024-11-24 #001.txtJump to behavior

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbsJump to dropped file
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbsJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbsJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,4_2_00419BC4
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041BCE3
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 6900, type: MEMORYSTR
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0040E54F Sleep,ExitProcess,4_2_0040E54F
                Source: eBHn6qHPLz.exe, 00000000.00000002.1868253544.00000000029D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 2730000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 4950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 6600000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 61F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 78A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: 88A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,4_2_004198C2
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeWindow / User API: threadDelayed 1133Jump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeWindow / User API: threadDelayed 8858Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-ICA02.tmp\_isetup\_setup64.tmpJump to dropped file
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeAPI coverage: 9.8 %
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exe TID: 5472Thread sleep count: 1133 > 30Jump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exe TID: 5472Thread sleep time: -3399000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exe TID: 5472Thread sleep count: 8858 > 30Jump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exe TID: 5472Thread sleep time: -26574000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0040B335
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,4_2_0041B42F
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0040B53A
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,4_2_004089A9
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00406AC2 FindFirstFileW,FindNextFileW,4_2_00406AC2
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,4_2_00407A8C
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,4_2_00418C69
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,4_2_00408DA7
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,4_2_00406F06
                Source: eBHn6qHPLz.exe, 00000000.00000002.1868253544.00000000029D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                Source: eBHn6qHPLz.exe, 00000004.00000002.4152822691.000000000154A000.00000004.00000020.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000004.00000002.4154242272.00000000015AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: eBHn6qHPLz.exe, 00000000.00000002.1868253544.00000000029D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeAPI call chain: ExitProcess graph end nodegraph_4-47062
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0043A65D
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_0041BCE3
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00442554 mov eax, dword ptr fs:[00000030h]4_2_00442554
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0044E92E GetProcessHeap,4_2_0044E92E
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00434168
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0043A65D
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00433B44
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00433CD7 SetUnhandledExceptionFilter,4_2_00433CD7
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMemory written: C:\Users\user\Desktop\eBHn6qHPLz.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe4_2_00410F36
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00418754 mouse_event,4_2_00418754
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe "C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe" Jump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeProcess created: C:\Users\user\Desktop\eBHn6qHPLz.exe "C:\Users\user\Desktop\eBHn6qHPLz.exe"Jump to behavior
                Source: eBHn6qHPLz.exe, 00000004.00000002.4152822691.000000000154A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00433E0A cpuid 4_2_00433E0A
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: GetLocaleInfoA,4_2_0040E679
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: EnumSystemLocalesW,4_2_004470AE
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: GetLocaleInfoW,4_2_004510BA
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_004511E3
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: GetLocaleInfoW,4_2_004512EA
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_004513B7
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: GetLocaleInfoW,4_2_00447597
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,4_2_00450A7F
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: EnumSystemLocalesW,4_2_00450CF7
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: EnumSystemLocalesW,4_2_00450D42
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: EnumSystemLocalesW,4_2_00450DDD
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_00450E6A
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeQueries volume information: C:\Users\user\Desktop\eBHn6qHPLz.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00404915 GetLocalTime,CreateEventA,CreateThread,4_2_00404915
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_0041A7A2 GetComputerNameExW,GetUserNameW,4_2_0041A7A2
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: 4_2_00448057 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,4_2_00448057
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4011578.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.4152822691.000000000154A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4152822691.0000000001537000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 6900, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 3004, type: MEMORYSTR
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data4_2_0040B21B
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\4_2_0040B335
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: \key3.db4_2_0040B335

                Remote Access Functionality

                barindex
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-JVWXPCJump to behavior
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.eBHn6qHPLz.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4394110.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eBHn6qHPLz.exe.4011578.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.4152822691.000000000154A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4152822691.0000000001537000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 6900, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: eBHn6qHPLz.exe PID: 3004, type: MEMORYSTR
                Source: C:\Users\user\Desktop\eBHn6qHPLz.exeCode function: cmd.exe4_2_00405042
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts1
                Native API
                1
                Scripting
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services12
                Archive Collected Data
                12
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                1
                Bypass User Account Control
                11
                Deobfuscate/Decode Files or Information
                111
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol111
                Input Capture
                2
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts1
                Scheduled Task/Job
                1
                Windows Service
                1
                Access Token Manipulation
                31
                Obfuscated Files or Information
                2
                Credentials In Files
                1
                System Service Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts2
                Service Execution
                1
                Scheduled Task/Job
                1
                Windows Service
                11
                Software Packing
                NTDS3
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchd2
                Registry Run Keys / Startup Folder
                122
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets43
                System Information Discovery
                SSHKeylogging2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                Scheduled Task/Job
                1
                Bypass User Account Control
                Cached Domain Credentials221
                Security Software Discovery
                VNCGUI Input Capture12
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
                Registry Run Keys / Startup Folder
                1
                Masquerading
                DCSync2
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                Virtualization/Sandbox Evasion
                Proc Filesystem3
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron122
                Process Injection
                Network Sniffing3
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562024 Sample: eBHn6qHPLz.exe Startdate: 25/11/2024 Architecture: WINDOWS Score: 96 34 geoplugin.net 2->34 40 Suricata IDS alerts for network traffic 2->40 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 13 other signatures 2->46 8 eBHn6qHPLz.exe 7 2->8         started        signatures3 process4 file5 26 C:\Users\user\AppData\...\defenderupdate.exe, PE32 8->26 dropped 28 setup_s.t.a.l.k.e....byl_436_(77912).exe, PE32 8->28 dropped 30 C:\...\defenderupdate.exe:Zone.Identifier, ASCII 8->30 dropped 32 C:\Users\user\AppData\...\defenderupdate.vbs, ASCII 8->32 dropped 48 Contains functionality to bypass UAC (CMSTPLUA) 8->48 50 Contains functionalty to change the wallpaper 8->50 52 Drops VBS files to the startup folder 8->52 54 6 other signatures 8->54 12 eBHn6qHPLz.exe 3 13 8->12         started        16 setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe 2 8->16         started        signatures6 process7 dnsIp8 36 5.181.159.153, 1151, 49731 MIVOCLOUDMD Moldova Republic of 12->36 38 geoplugin.net 178.237.33.50, 49733, 80 ATOM86-ASATOM86NL Netherlands 12->38 56 Detected Remcos RAT 12->56 22 setup_s.t.a.l.k.e....byl_436_(77912).tmp, PE32 16->22 dropped 19 setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp 3 12 16->19         started        file9 signatures10 process11 file12 24 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 19->24 dropped

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                eBHn6qHPLz.exe61%ReversingLabsByteCode-MSIL.Trojan.Generic
                eBHn6qHPLz.exe58%VirustotalBrowse
                eBHn6qHPLz.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\defenderupdate.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp4%ReversingLabs
                C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp0%VirustotalBrowse
                C:\Users\user\AppData\Local\Temp\is-ICA02.tmp\_isetup\_setup64.tmp0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe0%ReversingLabs
                C:\Users\user\AppData\Roaming\defenderupdate.exe61%ReversingLabsByteCode-MSIL.Trojan.Generic
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.gog.com$http://www.gog.com$http://www.gog.com.436.0%Avira URL Cloudsafe
                http://www.gog.com030%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                geoplugin.net
                178.237.33.50
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://geoplugin.net/json.gpfalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.innosetup.com/setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1859842366.00000000032D0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1860341691.000000007F190000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000000.1861507187.0000000000D91000.00000020.00000001.01000000.00000008.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp.2.drfalse
                      high
                      http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                        high
                        https://www.gog.com/galaxysetup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.4154270392.000000007F2E0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1858806412.0000000003190000.00000004.00001000.00020000.00000000.sdmpfalse
                          high
                          https://sectigo.com/CPS0eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                            high
                            http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                              high
                              https://github.com/mgravell/protobuf-netieBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/14436606/23354eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1868253544.00000000029D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/mgravell/protobuf-netJeBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpfalse
                                    high
                                    http://ocsp.sectigo.com0eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                                      high
                                      http://geoplugin.net/json.gp/CeBHn6qHPLz.exe, 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, eBHn6qHPLz.exe, 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                        high
                                        https://stackoverflow.com/q/11564914/23354;eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpfalse
                                          high
                                          https://stackoverflow.com/q/2152978/23354eBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpfalse
                                            high
                                            http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zeBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                                              high
                                              http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUeBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D59000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000000.1858005911.00000000005E1000.00000020.00000001.01000000.00000007.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                                                high
                                                http://www.gog.com$http://www.gog.com$http://www.gog.com.436.setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1858806412.0000000003190000.00000004.00001000.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.gog.com03setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.4151972673.0000000002F33000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4152728188.0000000003063000.00000004.00001000.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://github.com/mgravell/protobuf-neteBHn6qHPLz.exe, 00000000.00000002.1891059464.0000000005550000.00000004.08000000.00040000.00000000.sdmpfalse
                                                  high
                                                  http://geoplugin.net/json.gpweBHn6qHPLz.exe, 00000004.00000002.4152822691.000000000158D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.remobjects.com/pssetup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1859842366.00000000032D0000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1860341691.000000007F190000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000000.1861507187.0000000000D91000.00000020.00000001.01000000.00000008.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp.2.drfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameeBHn6qHPLz.exe, 00000000.00000002.1868253544.00000000029D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://geoplugin.net/json.gpyeBHn6qHPLz.exe, 00000004.00000002.4152822691.000000000158D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#eBHn6qHPLz.exe, 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe.0.drfalse
                                                            high
                                                            http://www.dk-soft.org/setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000002.4151972673.0000000002EAA000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe, 00000002.00000003.1858806412.0000000003190000.00000004.00001000.00020000.00000000.sdmp, setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp, 00000003.00000002.4152728188.0000000002F9B000.00000004.00001000.00020000.00000000.sdmpfalse
                                                              high
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              5.181.159.153
                                                              unknownMoldova Republic of
                                                              39798MIVOCLOUDMDtrue
                                                              178.237.33.50
                                                              geoplugin.netNetherlands
                                                              8455ATOM86-ASATOM86NLfalse
                                                              Joe Sandbox version:41.0.0 Charoite
                                                              Analysis ID:1562024
                                                              Start date and time:2024-11-25 04:36:06 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 9m 32s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:8
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:eBHn6qHPLz.exe
                                                              renamed because original name is a hash value
                                                              Original Sample Name:12f35a41245c2dbb16d0574d9dcc59c9.exe
                                                              Detection:MAL
                                                              Classification:mal96.rans.troj.spyw.expl.evad.winEXE@7/8@1/2
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:
                                                              • Successful, ratio: 96%
                                                              • Number of executed functions: 189
                                                              • Number of non-executed functions: 206
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              TimeTypeDescription
                                                              03:37:18AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defenderupdate.vbs
                                                              22:37:52API Interceptor4059666x Sleep call for process: eBHn6qHPLz.exe modified
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              178.237.33.50mCtN05kxh6.exeGet hashmaliciousRemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              Bank Fund Transfer-589237.scr.exeGet hashmaliciousRemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              Payment Transfer Request Form.bat.exeGet hashmaliciousRemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              CargoInvoice_Outstanding_56789_2024-11-21.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                              • geoplugin.net/json.gp
                                                              payment receipt copy.bat.exeGet hashmaliciousRemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              1732341066786265aade6e9541774ff20509504237780da7874a65dc23bf44c6634c553abe427.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              17323410671691fb610332a2a23e84df9d573b6d7d338d6835a49e8e0241717de8180586cb855.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              17323144242c7236b99d23fa10a9292bd7fb1c1fb47a26f3a8dc1daae9ecf25bbc7e35eb77810.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              018292540-LetterReguranPPI-20230814215304.PDF.exeGet hashmaliciousRemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              800399031-18.11.2024.pdf.exeGet hashmaliciousRemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              geoplugin.netmCtN05kxh6.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              Bank Fund Transfer-589237.scr.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              Payment Transfer Request Form.bat.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              CargoInvoice_Outstanding_56789_2024-11-21.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                              • 178.237.33.50
                                                              payment receipt copy.bat.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              1732341066786265aade6e9541774ff20509504237780da7874a65dc23bf44c6634c553abe427.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              17323410671691fb610332a2a23e84df9d573b6d7d338d6835a49e8e0241717de8180586cb855.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              17323144242c7236b99d23fa10a9292bd7fb1c1fb47a26f3a8dc1daae9ecf25bbc7e35eb77810.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              018292540-LetterReguranPPI-20230814215304.PDF.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              800399031-18.11.2024.pdf.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              MIVOCLOUDMDI2BJhmJou4.exeGet hashmaliciousLummaC StealerBrowse
                                                              • 94.158.244.69
                                                              I5jG2Os8GA.exeGet hashmaliciousLummaC StealerBrowse
                                                              • 94.158.244.69
                                                              OlZzqwjrwO.exeGet hashmaliciousLummaC StealerBrowse
                                                              • 94.158.244.69
                                                              Vd3tOP5WSD.exeGet hashmaliciousLummaC StealerBrowse
                                                              • 94.158.244.69
                                                              g1kWKm20Z5.exeGet hashmaliciousLummaC StealerBrowse
                                                              • 94.158.244.69
                                                              cgln32y2HF.exeGet hashmaliciousLummaC StealerBrowse
                                                              • 94.158.244.69
                                                              4Oq9i3gm0g.exeGet hashmaliciousLummaC StealerBrowse
                                                              • 94.158.244.69
                                                              RX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                              • 94.158.244.69
                                                              5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                              • 94.158.244.69
                                                              dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                              • 94.158.244.69
                                                              ATOM86-ASATOM86NLmCtN05kxh6.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              Bank Fund Transfer-589237.scr.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              Payment Transfer Request Form.bat.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              CargoInvoice_Outstanding_56789_2024-11-21.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                              • 178.237.33.50
                                                              payment receipt copy.bat.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              1732341066786265aade6e9541774ff20509504237780da7874a65dc23bf44c6634c553abe427.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              17323410671691fb610332a2a23e84df9d573b6d7d338d6835a49e8e0241717de8180586cb855.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              17323144242c7236b99d23fa10a9292bd7fb1c1fb47a26f3a8dc1daae9ecf25bbc7e35eb77810.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              018292540-LetterReguranPPI-20230814215304.PDF.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              800399031-18.11.2024.pdf.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              No context
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              C:\Users\user\AppData\Local\Temp\is-ICA02.tmp\_isetup\_setup64.tmp2024.1.16.exeGet hashmaliciousUnknownBrowse
                                                                2024.1.16.exeGet hashmaliciousUnknownBrowse
                                                                  veraport-g3-x64.exeGet hashmaliciousUnknownBrowse
                                                                    ChromeSetup.exeGet hashmaliciousSpark RATBrowse
                                                                      ChromeSetup.exeGet hashmaliciousSpark RATBrowse
                                                                        file.exeGet hashmaliciousAmadeyBrowse
                                                                          Y7Zv23yKfb.exeGet hashmaliciousMicroClipBrowse
                                                                            Y7Zv23yKfb.exeGet hashmaliciousMicroClipBrowse
                                                                              cho_mea64.exeGet hashmaliciousMicroClipBrowse
                                                                                cho_mea64.exeGet hashmaliciousMicroClipBrowse
                                                                                  Process:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):962
                                                                                  Entropy (8bit):5.015105568788186
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:tkluQ+nd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qluQydRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                                  MD5:8937B63DC0B37E949F38E7874886D999
                                                                                  SHA1:62FD17BF5A029DDD3A5CFB4F5FC9FE83A346FFFC
                                                                                  SHA-256:AB2F31E4512913B1E7F7ACAB4B72D6E741C960D0A482F09EA6F9D96FED842A66
                                                                                  SHA-512:077176C51DC10F155EE08326270C1FE3E6CF36C7ABA75611BDB3CCDA2526D6F0360DBC2FBF4A9963051F0F01658017389FD898980ACF7BB3B29B287F188EE7B9
                                                                                  Malicious:false
                                                                                  Reputation:moderate, very likely benign file
                                                                                  Preview:{. "geoplugin_request":"8.46.123.75",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp
                                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):13155
                                                                                  Entropy (8bit):4.769399737621596
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:ESFtA8IcWxDOOV0KOVDOV1SOVyOVnERCRpjR3:ztApqQARsZ1
                                                                                  MD5:F6A23E4B5891C9AE72E023832C8AF029
                                                                                  SHA1:7749A4C941D45C39A2BF14CAB7C0D80A1BDE994D
                                                                                  SHA-256:6BEFC0FDE794E0D95E4B777344F156A988767515F5B840DB3AF4FF5443D436F9
                                                                                  SHA-512:7BD28F4200BE01447C93E2478CF80F819B5E92FB61AE5368826C48437E6F96E065D32B5D0CFD7C34D8769E3813D76F2D7D161CEEA3FFB8C5C4B1B819D12F9D06
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:.2024-11-24 22:37:15.781 Log opened. (Time zone: UTC-05:00)..2024-11-24 22:37:15.781 Setup version: Inno Setup version 5.6.1 (u)..2024-11-24 22:37:15.781 Original Setup EXE: C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe..2024-11-24 22:37:15.781 Setup command line: /SL5="$8028E,192512,0,C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe" ..2024-11-24 22:37:15.781 Windows version: 10.0.19045 (NT platform: Yes)..2024-11-24 22:37:15.781 64-bit Windows: Yes..2024-11-24 22:37:15.781 Processor architecture: x64..2024-11-24 22:37:15.781 User privileges: Administrative..2024-11-24 22:37:16.062 64-bit install mode: No..2024-11-24 22:37:18.906 Created temporary directory: C:\Users\user\AppData\Local\Temp\is-ICA02.tmp..2024-11-24 22:37:18.922 -- DLL function import --..2024-11-24 22:37:18.922 Function name: GetDriveTypeW..2024-11-24 22:37:18.922 DLL name: kernel32.dll..2024-11-24 22
                                                                                  Process:C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):1335808
                                                                                  Entropy (8bit):6.626175390113613
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:HgNfn7OOXeL7dJ/oOP9pjA0fY2Mqz9JT7ytfsxjHElkLD229Oqkipt1NCnqxjVV:AtTX6THjACMq/xCaaMksgi7
                                                                                  MD5:FF5EBF66CDDD9913B729DE78EEB638C8
                                                                                  SHA1:CA23D5639D1C516E3DEFC8F5B267BB5C040238D5
                                                                                  SHA-256:ABF8D4D522CA94A179D644EC0464474B580EC82441B118B663DA3BD879F91D85
                                                                                  SHA-512:4FA3A2DC8AD68BFFFC0E039171D2DA71C3C37EADE709D5495E825BB53F576180EAFEE57E3C1F78D7DCC8D26E26CC24E1E99BB494D9B4A55F74F4145EB6E5A05B
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                  Reputation:low
                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...M.z[.................V...........f.......p....@.......................... ............@......@..............................@8......D....................p...............................`.......................................................text...|<.......>.................. ..`.itext.......P.......B.............. ..`.data..../...p...0...Z..............@....bss.....a...............................idata..@8.......:..................@....tls....<....P...........................rdata.......`......................@..@.reloc.......p......................@..B.rsrc...D...........................@..@............. .......d..............@..@................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp
                                                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):6144
                                                                                  Entropy (8bit):4.720366600008286
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                  MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                  SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                  SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                  SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: 2024.1.16.exe, Detection: malicious, Browse
                                                                                  • Filename: 2024.1.16.exe, Detection: malicious, Browse
                                                                                  • Filename: veraport-g3-x64.exe, Detection: malicious, Browse
                                                                                  • Filename: ChromeSetup.exe, Detection: malicious, Browse
                                                                                  • Filename: ChromeSetup.exe, Detection: malicious, Browse
                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                  • Filename: Y7Zv23yKfb.exe, Detection: malicious, Browse
                                                                                  • Filename: Y7Zv23yKfb.exe, Detection: malicious, Browse
                                                                                  • Filename: cho_mea64.exe, Detection: malicious, Browse
                                                                                  • Filename: cho_mea64.exe, Detection: malicious, Browse
                                                                                  Reputation:high, very likely benign file
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):2849736
                                                                                  Entropy (8bit):6.9619664618602135
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:iigPg3mBjR9EvCHl/RX7JQ221GtsCFonRHmb+G4O60X8Bug+Hmjv4gB:cgWBjj+2l/RX1QtUFFonR4+tO6Rug+G/
                                                                                  MD5:719E5D10DAFEDD2EFC8FD7A446AB7C2F
                                                                                  SHA1:5F9CDE6382D023EEE636719AEE4F6F18FC8F1E49
                                                                                  SHA-256:F3176C204871908753CCD551407CA451AFD87351F87C53998E87BD77B2E39831
                                                                                  SHA-512:7368FE86797E3AC03E9CD20F4542EA48330DA9B89401DDE63F304B86B819AE0842EDA327A4752671EF3FB3284FFACE2B2B412B6ED772BEDD561711453B04C090
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Reputation:low
                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....L/\............................\........ ....@..................................+...@......@...................................................Z+.H!...........................................................................................text............................... ..`.itext.............................. ..`.data........ ......................@....bss.....V...0...........................idata..............................@....tls.................,...................rdata...............,..............@..@.reloc..............................@..B.rsrc................B..............@..@....................................@..@................................................................................................
                                                                                  Process:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):89
                                                                                  Entropy (8bit):4.699181364242189
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:FER/n0eFHHot+kiEaKC5JtNJHHn:FER/lFHIwknaZ5vn
                                                                                  MD5:A429E2AA7E299EBCB8DE3E1520E2FEC8
                                                                                  SHA1:1E0D0B49B38E997A4B6366749415118016C68065
                                                                                  SHA-256:142EE5E243E33F8A7B0CBAAB6637F89DDA18191A6DE73CB6623846F7D11BFB85
                                                                                  SHA-512:01528A30FEEE1D4BF55CC9218191BADC50F627497AC7E00AF83172F4B0E46467925CB394F1529F0C8B73557F9BDF4050E44ED8B708599DB3316398DCC8E016CC
                                                                                  Malicious:true
                                                                                  Reputation:low
                                                                                  Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\defenderupdate.exe"""
                                                                                  Process:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):3410432
                                                                                  Entropy (8bit):7.998628590725982
                                                                                  Encrypted:true
                                                                                  SSDEEP:49152:cBwJhUhNLguhinxeDZf2g5rskMP2/9SKgY/dyXMTBqtr7hDMukLdpHx5vnvaluNn:DJK5linxmf3rsN2/gXY0UZpRlyxwxx
                                                                                  MD5:12F35A41245C2DBB16D0574D9DCC59C9
                                                                                  SHA1:4D192C491EB0F4CF477B008EC2B0798940915EE0
                                                                                  SHA-256:9FAB1939599469D96091A078E0ED884ED100CFCA13FA89F2E48E9937F0E1535C
                                                                                  SHA-512:FC66A9C862C5CF2F7AD2436D31476E255445CEDD05C906C0F1FDB85DE52ECE8AA931B1CECFA0990BD5DC7D4937B4F2B8442E9BF7F216D03E48A7F3500A6C4046
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 61%
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W.@g..................2..:........2.. ........@.. .......................`4...........`...................................2.K.....3..8...................@4...................................................... ............... ..H............text...4.2.. ....2................. ..`.rsrc....8....3..8....2.............@..@.reloc.......@4.......4.............@..B..................2.....H.........2.P+...........r...N2..........................................0..........(....*.*.s....(....*.0..e........(....(.....+M.o....~....%-.&~..........s....%.....(...+...(....-.. k]..(.... .......o....&..(....-.*....0..[..........(.....s...... .]..(....(....o..... .]..(....(....o.....o........io........,..o.....&..*.........=L..........SV........(....*.s.........*..(....*Z.o.... a]..(....o....*.~....-# .]..(.........(....o....s.........~....*.~....*.......*~(.... .]..(.
                                                                                  Process:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:modified
                                                                                  Size (bytes):26
                                                                                  Entropy (8bit):3.95006375643621
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                  Malicious:true
                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Entropy (8bit):7.998628590725982
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                  File name:eBHn6qHPLz.exe
                                                                                  File size:3'410'432 bytes
                                                                                  MD5:12f35a41245c2dbb16d0574d9dcc59c9
                                                                                  SHA1:4d192c491eb0f4cf477b008ec2b0798940915ee0
                                                                                  SHA256:9fab1939599469d96091a078e0ed884ed100cfca13fa89f2e48e9937f0e1535c
                                                                                  SHA512:fc66a9c862c5cf2f7ad2436d31476e255445cedd05c906c0f1fdb85de52ece8aa931b1cecfa0990bd5dc7d4937b4f2b8442e9bf7f216d03e48a7f3500a6c4046
                                                                                  SSDEEP:49152:cBwJhUhNLguhinxeDZf2g5rskMP2/9SKgY/dyXMTBqtr7hDMukLdpHx5vnvaluNn:DJK5linxmf3rsN2/gXY0UZpRlyxwxx
                                                                                  TLSH:83F53305B4DEE7CDCB3C36724FD2A2A0EE21D766E1A3F65BBC03D55239192A061E650C
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W.@g..................2..:........2.. ........@.. .......................`4...........`................................
                                                                                  Icon Hash:0f6decece879218f
                                                                                  Entrypoint:0x72ed2e
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x6740DB57 [Fri Nov 22 19:28:23 2024 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                  Instruction
                                                                                  jmp dword ptr [00402000h]
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x32ece00x4b.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3300000x13800.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x3440000xc.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x20000x32cd340x32ce006055d72f83513443876b0e3de12a13a2unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0x3300000x138000x13800154e89df516d84d9c76e771575370abdFalse0.9894706530448718data7.976621047292781IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x3440000xc0x2001f504dd4cf79ac58f854689feb21bc29False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_ICON0x3301300x13164PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0001023279611154
                                                                                  RT_GROUP_ICON0x3432940x14Targa image data - Map 32 x 12644 x 1 +11.05
                                                                                  RT_VERSION0x3432a80x31cdata0.4321608040201005
                                                                                  RT_MANIFEST0x3435c40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                  DLLImport
                                                                                  mscoree.dll_CorExeMain
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-11-25T04:37:17.522372+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.4497315.181.159.1531151TCP
                                                                                  2024-11-25T04:37:18.765337+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response15.181.159.1531151192.168.2.449731TCP
                                                                                  2024-11-25T04:37:20.643518+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449733178.237.33.5080TCP
                                                                                  2024-11-25T04:39:38.596604+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response15.181.159.1531151192.168.2.449731TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 25, 2024 04:37:17.401503086 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:37:17.521218061 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:37:17.521327972 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:37:17.522372007 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:37:17.642081022 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:37:18.765336990 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:37:18.807526112 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:37:18.845674992 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:37:18.965455055 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:37:18.998553991 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:37:19.041903973 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:37:19.235496998 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:37:19.355146885 CET8049733178.237.33.50192.168.2.4
                                                                                  Nov 25, 2024 04:37:19.355263948 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:37:19.365556002 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:37:19.485002041 CET8049733178.237.33.50192.168.2.4
                                                                                  Nov 25, 2024 04:37:20.643393040 CET8049733178.237.33.50192.168.2.4
                                                                                  Nov 25, 2024 04:37:20.643517971 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:37:20.659933090 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:37:20.822612047 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:37:21.643330097 CET8049733178.237.33.50192.168.2.4
                                                                                  Nov 25, 2024 04:37:21.646702051 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:37:38.590626955 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:37:38.592720032 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:37:38.712641954 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:38:08.585860014 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:38:08.587310076 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:38:08.706909895 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:38:38.617717028 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:38:38.624521017 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:38:38.856498003 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:39:08.612761974 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:39:08.614017963 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:39:08.733506918 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:39:09.081337929 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:39:09.386136055 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:39:09.995502949 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:39:11.198621988 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:39:13.604932070 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:39:18.417418957 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:39:28.026829958 CET4973380192.168.2.4178.237.33.50
                                                                                  Nov 25, 2024 04:39:38.596604109 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:39:38.597809076 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:39:38.717299938 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:40:08.611706972 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:40:08.613184929 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:40:08.732712030 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:40:38.626436949 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:40:38.654321909 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:40:38.773925066 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:41:08.626427889 CET1151497315.181.159.153192.168.2.4
                                                                                  Nov 25, 2024 04:41:08.626910925 CET497311151192.168.2.45.181.159.153
                                                                                  Nov 25, 2024 04:41:08.746480942 CET1151497315.181.159.153192.168.2.4
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 25, 2024 04:37:19.086464882 CET6212453192.168.2.41.1.1.1
                                                                                  Nov 25, 2024 04:37:19.228488922 CET53621241.1.1.1192.168.2.4
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Nov 25, 2024 04:37:19.086464882 CET192.168.2.41.1.1.10x6a85Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Nov 25, 2024 04:37:19.228488922 CET1.1.1.1192.168.2.40x6a85No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                  • geoplugin.net
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.449733178.237.33.50803004C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Nov 25, 2024 04:37:19.365556002 CET71OUTGET /json.gp HTTP/1.1
                                                                                  Host: geoplugin.net
                                                                                  Cache-Control: no-cache
                                                                                  Nov 25, 2024 04:37:20.643393040 CET1170INHTTP/1.1 200 OK
                                                                                  date: Mon, 25 Nov 2024 03:37:20 GMT
                                                                                  server: Apache
                                                                                  content-length: 962
                                                                                  content-type: application/json; charset=utf-8
                                                                                  cache-control: public, max-age=300
                                                                                  access-control-allow-origin: *
                                                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 37 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                                  Data Ascii: { "geoplugin_request":"8.46.123.75", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:22:36:58
                                                                                  Start date:24/11/2024
                                                                                  Path:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\eBHn6qHPLz.exe"
                                                                                  Imagebase:0x2b0000
                                                                                  File size:3'410'432 bytes
                                                                                  MD5 hash:12F35A41245C2DBB16D0574D9DCC59C9
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1882380036.000000000446A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1868253544.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1923860774.0000000007600000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1882380036.0000000003D86000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:2
                                                                                  Start time:22:37:15
                                                                                  Start date:24/11/2024
                                                                                  Path:C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe"
                                                                                  Imagebase:0x5e0000
                                                                                  File size:2'849'736 bytes
                                                                                  MD5 hash:719E5D10DAFEDD2EFC8FD7A446AB7C2F
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:Borland Delphi
                                                                                  Antivirus matches:
                                                                                  • Detection: 0%, ReversingLabs
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Target ID:3
                                                                                  Start time:22:37:15
                                                                                  Start date:24/11/2024
                                                                                  Path:C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\is-AM91E.tmp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).tmp" /SL5="$8028E,192512,0,C:\Users\user\AppData\Local\Temp\setup_s.t.a.l.k.e.r._2_heart_of_chornobyl_436_(77912).exe"
                                                                                  Imagebase:0xd90000
                                                                                  File size:1'335'808 bytes
                                                                                  MD5 hash:FF5EBF66CDDD9913B729DE78EEB638C8
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:Borland Delphi
                                                                                  Antivirus matches:
                                                                                  • Detection: 4%, ReversingLabs
                                                                                  • Detection: 0%, Virustotal, Browse
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Target ID:4
                                                                                  Start time:22:37:15
                                                                                  Start date:24/11/2024
                                                                                  Path:C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\eBHn6qHPLz.exe"
                                                                                  Imagebase:0xd70000
                                                                                  File size:3'410'432 bytes
                                                                                  MD5 hash:12F35A41245C2DBB16D0574D9DCC59C9
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4152822691.000000000154A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4152822691.0000000001537000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:11.9%
                                                                                    Dynamic/Decrypted Code Coverage:97.4%
                                                                                    Signature Coverage:3.4%
                                                                                    Total number of Nodes:267
                                                                                    Total number of Limit Nodes:11
                                                                                    execution_graph 54504 50034c0 54505 50034dd 54504->54505 54506 50034ed 54505->54506 54512 6368df4 54505->54512 54515 6366439 54505->54515 54518 636a441 54505->54518 54522 6363850 54505->54522 54525 6362e63 54505->54525 54529 636eed0 54512->54529 54541 636d7f0 54515->54541 54519 636a460 54518->54519 54521 636d7f0 VirtualProtect 54519->54521 54520 636a48b 54521->54520 54524 636d7f0 VirtualProtect 54522->54524 54523 63601db 54524->54523 54526 6362e82 54525->54526 54528 636d7f0 VirtualProtect 54526->54528 54527 6362ea9 54528->54527 54530 636eee5 54529->54530 54533 636ef20 54530->54533 54535 636ef47 54533->54535 54537 636f028 54535->54537 54538 636f068 VirtualAlloc 54537->54538 54540 63601db 54538->54540 54543 636d817 54541->54543 54545 636dc40 54543->54545 54546 636dc88 VirtualProtect 54545->54546 54548 63601db 54546->54548 54500 49c3e28 54501 49c3e7d CopyFileA 54500->54501 54503 49c3f7f 54501->54503 54472 4956310 54473 4956325 54472->54473 54477 4956341 54473->54477 54482 4956350 54473->54482 54474 495633b 54478 495637a 54477->54478 54479 49565c0 54478->54479 54487 4959a34 54478->54487 54491 4959a38 54478->54491 54479->54474 54484 495637a 54482->54484 54483 49565c0 54483->54474 54484->54483 54485 4959a34 SleepEx 54484->54485 54486 4959a38 SleepEx 54484->54486 54485->54484 54486->54484 54488 4959a78 SleepEx 54487->54488 54490 4959ab6 54488->54490 54490->54478 54492 4959a78 SleepEx 54491->54492 54494 4959ab6 54492->54494 54494->54478 54498 277cd60 DuplicateHandle 54499 277cdf6 54498->54499 54730 277a390 54733 277a488 54730->54733 54731 277a39f 54734 277a4bc 54733->54734 54736 277a499 54733->54736 54734->54731 54735 277a6c0 GetModuleHandleW 54737 277a6ed 54735->54737 54736->54734 54736->54735 54737->54731 54495 49cd997 54496 49cd957 NtProtectVirtualMemory 54495->54496 54497 49cd95f 54495->54497 54496->54497 54738 efd104 54740 efd11c 54738->54740 54739 efd177 54740->54739 54742 636e248 54740->54742 54743 636e270 54742->54743 54746 636ead8 54743->54746 54744 636e297 54747 636eb05 54746->54747 54748 636d7f0 VirtualProtect 54747->54748 54750 636ec9b 54747->54750 54749 636ec8c 54748->54749 54749->54744 54750->54744 54549 49c4a50 54550 49c4a65 54549->54550 54556 49c4bb5 54550->54556 54560 49c4a80 54550->54560 54564 49c4a90 54550->54564 54568 49c5005 54550->54568 54551 49c4a7b 54558 49c4ae7 54556->54558 54557 49c4afc 54557->54551 54558->54557 54572 49c5fb1 54558->54572 54562 49c4aba 54560->54562 54561 49c4afc 54561->54551 54562->54561 54563 49c5fb1 10 API calls 54562->54563 54563->54562 54566 49c4aba 54564->54566 54565 49c4afc 54565->54551 54566->54565 54567 49c5fb1 10 API calls 54566->54567 54567->54566 54570 49c4ae7 54568->54570 54569 49c4afc 54569->54551 54570->54569 54571 49c5fb1 10 API calls 54570->54571 54571->54570 54573 49c5fbd 54572->54573 54577 49c61d4 54573->54577 54582 49c625d 54573->54582 54574 49c5ff7 54574->54558 54578 49c61ec 54577->54578 54587 49c6850 54578->54587 54601 49c6860 54578->54601 54579 49c607b 54579->54574 54583 49c61f5 54582->54583 54584 49c607b 54582->54584 54585 49c6850 10 API calls 54583->54585 54586 49c6860 10 API calls 54583->54586 54584->54574 54585->54584 54586->54584 54588 49c6860 54587->54588 54615 49c6abf 54588->54615 54620 49c6a5e 54588->54620 54625 49c786e 54588->54625 54630 49c6f91 54588->54630 54635 49c6b61 54588->54635 54640 49c6b46 54588->54640 54645 49c7975 54588->54645 54650 49c71e5 54588->54650 54655 49c6b04 54588->54655 54660 49c70bb 54588->54660 54665 49c703a 54588->54665 54589 49c6897 54589->54579 54602 49c6875 54601->54602 54604 49c786e 2 API calls 54602->54604 54605 49c6a5e 2 API calls 54602->54605 54606 49c6abf 2 API calls 54602->54606 54607 49c703a 2 API calls 54602->54607 54608 49c70bb 2 API calls 54602->54608 54609 49c6b04 2 API calls 54602->54609 54610 49c71e5 2 API calls 54602->54610 54611 49c7975 2 API calls 54602->54611 54612 49c6b46 2 API calls 54602->54612 54613 49c6b61 2 API calls 54602->54613 54614 49c6f91 2 API calls 54602->54614 54603 49c6897 54603->54579 54604->54603 54605->54603 54606->54603 54607->54603 54608->54603 54609->54603 54610->54603 54611->54603 54612->54603 54613->54603 54614->54603 54616 49c6acc 54615->54616 54670 49cfa18 54616->54670 54674 49cfa20 54616->54674 54617 49c709c 54621 49c6a6d 54620->54621 54678 49ceb00 54621->54678 54682 49ceafa 54621->54682 54622 49c69ec 54626 49c787d 54625->54626 54628 49ceafa Wow64SetThreadContext 54626->54628 54629 49ceb00 Wow64SetThreadContext 54626->54629 54627 49c69ec 54628->54627 54629->54627 54631 49c6fa0 54630->54631 54686 49cf39a 54631->54686 54690 49cf3a0 54631->54690 54632 49c7011 54632->54589 54636 49c6b70 54635->54636 54638 49cf39a WriteProcessMemory 54636->54638 54639 49cf3a0 WriteProcessMemory 54636->54639 54637 49c6c14 54637->54589 54638->54637 54639->54637 54642 49c6b50 54640->54642 54641 49c69ec 54642->54641 54694 49cf0f8 54642->54694 54698 49cf100 54642->54698 54646 49c798d 54645->54646 54702 49c8190 54646->54702 54707 49c8180 54646->54707 54647 49c79a5 54651 49c71ef 54650->54651 54653 49cf0f8 VirtualAllocEx 54651->54653 54654 49cf100 VirtualAllocEx 54651->54654 54652 49c69ec 54653->54652 54654->54652 54656 49c69ec 54655->54656 54657 49c720b 54655->54657 54658 49cf0f8 VirtualAllocEx 54657->54658 54659 49cf100 VirtualAllocEx 54657->54659 54658->54656 54659->54656 54661 49c70ca 54660->54661 54663 49cf39a WriteProcessMemory 54661->54663 54664 49cf3a0 WriteProcessMemory 54661->54664 54662 49c69ec 54663->54662 54664->54662 54666 49c7044 54665->54666 54668 49cfa18 NtResumeThread 54666->54668 54669 49cfa20 NtResumeThread 54666->54669 54667 49c709c 54668->54667 54669->54667 54671 49cfa20 NtResumeThread 54670->54671 54673 49cfa9d 54671->54673 54673->54617 54675 49cfa68 NtResumeThread 54674->54675 54677 49cfa9d 54675->54677 54677->54617 54679 49ceb45 Wow64SetThreadContext 54678->54679 54681 49ceb8d 54679->54681 54681->54622 54683 49ceb00 Wow64SetThreadContext 54682->54683 54685 49ceb8d 54683->54685 54685->54622 54687 49cf3a0 WriteProcessMemory 54686->54687 54689 49cf43f 54687->54689 54689->54632 54691 49cf3e8 WriteProcessMemory 54690->54691 54693 49cf43f 54691->54693 54693->54632 54695 49cf140 VirtualAllocEx 54694->54695 54697 49cf17d 54695->54697 54697->54641 54699 49cf140 VirtualAllocEx 54698->54699 54701 49cf17d 54699->54701 54701->54641 54703 49c81a7 54702->54703 54704 49c81c9 54703->54704 54712 49c82ec 54703->54712 54717 49c8270 54703->54717 54704->54647 54708 49c81a7 54707->54708 54709 49c81c9 54708->54709 54710 49c82ec 2 API calls 54708->54710 54711 49c8270 2 API calls 54708->54711 54709->54647 54710->54709 54711->54709 54713 49c8314 54712->54713 54722 49ce324 54713->54722 54726 49ce330 54713->54726 54718 49c827f 54717->54718 54720 49ce324 CreateProcessA 54718->54720 54721 49ce330 CreateProcessA 54718->54721 54719 49c86fd 54720->54719 54721->54719 54723 49ce394 54722->54723 54723->54723 54724 49ce4d4 CreateProcessA 54723->54724 54725 49ce51c 54724->54725 54727 49ce394 54726->54727 54727->54727 54728 49ce4d4 CreateProcessA 54727->54728 54729 49ce51c 54728->54729 54751 2774698 54752 27746a6 54751->54752 54755 2773e70 54752->54755 54754 27746af 54756 2773e7b 54755->54756 54759 2774250 54756->54759 54758 27746d5 54758->54754 54760 277425b 54759->54760 54763 2774260 54760->54763 54762 277476d 54762->54758 54764 277426b 54763->54764 54767 27743f8 54764->54767 54766 2774842 54766->54762 54768 2774403 54767->54768 54771 2774428 54768->54771 54770 2774954 54770->54766 54772 2774433 54771->54772 54773 27776e0 54772->54773 54779 2777988 54772->54779 54784 2777470 54773->54784 54775 2777750 54776 2777979 54775->54776 54788 277c441 54775->54788 54776->54770 54780 277790b 54779->54780 54782 277798b 54779->54782 54781 2777979 54780->54781 54783 277c441 KiUserCallbackDispatcher 54780->54783 54781->54773 54782->54773 54783->54781 54785 277747b 54784->54785 54786 2778f3a 54785->54786 54793 2778f89 54785->54793 54786->54775 54790 277c471 54788->54790 54789 277c495 54789->54776 54790->54789 54797 277c600 54790->54797 54801 277c5bd 54790->54801 54794 2778fdb 54793->54794 54795 2778fe6 KiUserCallbackDispatcher 54794->54795 54796 2779010 54794->54796 54795->54796 54796->54786 54798 277c60d 54797->54798 54799 277c647 54798->54799 54805 277ae60 54798->54805 54799->54789 54802 277c5d5 54801->54802 54802->54789 54803 277c533 54802->54803 54804 277ae60 KiUserCallbackDispatcher 54802->54804 54803->54789 54804->54803 54806 277ae6b 54805->54806 54808 277d358 54806->54808 54809 277c764 54806->54809 54810 277c76f 54809->54810 54811 2774428 KiUserCallbackDispatcher 54810->54811 54812 277d3c7 54811->54812 54812->54808 54813 277cb18 54814 277cb5e GetCurrentProcess 54813->54814 54816 277cbb0 GetCurrentThread 54814->54816 54817 277cba9 54814->54817 54818 277cbe6 54816->54818 54819 277cbed GetCurrentProcess 54816->54819 54817->54816 54818->54819 54820 277cc23 54819->54820 54821 277cc4b GetCurrentThreadId 54820->54821 54822 277cc7c 54821->54822
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,bq$4$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                    • API String ID: 0-312445597
                                                                                    • Opcode ID: 3c99a7ed5c0838e1c22acba0c8f76cb7702012f9396af9708e1c86078852b853
                                                                                    • Instruction ID: eb7fe58c5e08d7a0fda66845b2b9802bff59595fd24c3548631c8baf0ae00e0c
                                                                                    • Opcode Fuzzy Hash: 3c99a7ed5c0838e1c22acba0c8f76cb7702012f9396af9708e1c86078852b853
                                                                                    • Instruction Fuzzy Hash: 0FB20A34A00218CFDB14DFA5C995BADB7B6BF48700F1485A9E50AAB3A4DB71EC85CF50
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,bq$4$$^q$$^q$$^q$$^q
                                                                                    • API String ID: 0-2546334966
                                                                                    • Opcode ID: d4702b73ef7d0eecc283ff16c35efb516e11ecf094c37bafe8207aa18af78534
                                                                                    • Instruction ID: 27f3e9846be2999d6bce101ab335948c58d8d07652fb0d31d4e9ecc4d5cee74c
                                                                                    • Opcode Fuzzy Hash: d4702b73ef7d0eecc283ff16c35efb516e11ecf094c37bafe8207aa18af78534
                                                                                    • Instruction Fuzzy Hash: 2222FB34A00218CFDB24DF64C995BADB7B6BF48304F1481A9E50AAB3A5DB31AD85CF50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1209 5007350-5007371 1211 5007373 1209->1211 1212 5007378-500745f 1209->1212 1211->1212 1214 5007b61-5007b89 1212->1214 1215 5007465-50075a6 call 5003b48 1212->1215 1218 5008205-500820e 1214->1218 1261 5007b2a-5007b54 1215->1261 1262 50075ac-5007607 1215->1262 1220 5008214-500822b 1218->1220 1221 5007b97-5007ba1 1218->1221 1222 5007ba3 1221->1222 1223 5007ba8-5007c9c call 5003b48 1221->1223 1222->1223 1244 5007cc6 1223->1244 1245 5007c9e-5007caa 1223->1245 1246 5007ccc-5007cec 1244->1246 1247 5007cb4-5007cba 1245->1247 1248 5007cac-5007cb2 1245->1248 1252 5007d4c-5007dcc 1246->1252 1253 5007cee-5007d47 1246->1253 1250 5007cc4 1247->1250 1248->1250 1250->1246 1273 5007e23-5007e66 call 5003b48 1252->1273 1274 5007dce-5007e21 1252->1274 1267 5008202 1253->1267 1275 5007b56 1261->1275 1276 5007b5e-5007b5f 1261->1276 1268 5007609 1262->1268 1269 500760c-5007617 1262->1269 1267->1218 1268->1269 1272 5007a3f-5007a45 1269->1272 1277 5007a4b-5007ac7 1272->1277 1278 500761c-500763a 1272->1278 1299 5007e71-5007e7a 1273->1299 1274->1299 1275->1276 1276->1214 1319 5007b14-5007b1a 1277->1319 1280 5007691-50076a6 1278->1280 1281 500763c-5007640 1278->1281 1287 50076a8 1280->1287 1288 50076ad-50076c3 1280->1288 1281->1280 1285 5007642-500764d 1281->1285 1291 5007683-5007689 1285->1291 1287->1288 1289 50076c5 1288->1289 1290 50076ca-50076e1 1288->1290 1289->1290 1294 50076e3 1290->1294 1295 50076e8-50076fe 1290->1295 1297 500768b-500768c 1291->1297 1298 500764f-5007653 1291->1298 1294->1295 1302 5007700 1295->1302 1303 5007705-500770c 1295->1303 1305 500770f-500777a 1297->1305 1300 5007655 1298->1300 1301 5007659-5007671 1298->1301 1306 5007eda-5007ee9 1299->1306 1300->1301 1307 5007673 1301->1307 1308 5007678-5007680 1301->1308 1302->1303 1303->1305 1310 500777c-5007788 1305->1310 1311 500778e-5007943 1305->1311 1312 5007eeb-5007f73 1306->1312 1313 5007e7c-5007ea4 1306->1313 1307->1308 1308->1291 1310->1311 1320 5007945-5007949 1311->1320 1321 50079a7-50079bc 1311->1321 1348 500809e-50080aa 1312->1348 1314 5007ea6 1313->1314 1315 5007eab-5007ed4 1313->1315 1314->1315 1315->1306 1326 5007ac9-5007b11 1319->1326 1327 5007b1c-5007b22 1319->1327 1320->1321 1322 500794b-500795a 1320->1322 1324 50079c3-50079e4 1321->1324 1325 50079be 1321->1325 1328 5007999-500799f 1322->1328 1329 50079e6 1324->1329 1330 50079eb-5007a0a 1324->1330 1325->1324 1326->1319 1327->1261 1335 50079a1-50079a2 1328->1335 1336 500795c-5007960 1328->1336 1329->1330 1332 5007a11-5007a31 1330->1332 1333 5007a0c 1330->1333 1341 5007a33 1332->1341 1342 5007a38 1332->1342 1333->1332 1343 5007a3c 1335->1343 1339 5007962-5007966 1336->1339 1340 500796a-500798b 1336->1340 1339->1340 1344 5007992-5007996 1340->1344 1345 500798d 1340->1345 1341->1342 1342->1343 1343->1272 1344->1328 1345->1344 1350 50080b0-50080fc 1348->1350 1351 5007f78-5007f81 1348->1351 1360 5008124-500813f 1350->1360 1361 50080fe-5008122 1350->1361 1352 5007f83 1351->1352 1353 5007f8a-5008092 1351->1353 1352->1353 1354 5007f90-5007fc1 1352->1354 1355 5007fc6-5007ff7 1352->1355 1356 5007ffc-500802d 1352->1356 1357 500802f-5008060 1352->1357 1363 5008098 1353->1363 1354->1363 1355->1363 1356->1363 1357->1363 1365 5008148-50081cc 1360->1365 1361->1365 1363->1348 1370 50081d3-50081f3 1365->1370 1370->1267
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: TJcq$Te^q$pbq$xbaq
                                                                                    • API String ID: 0-1954897716
                                                                                    • Opcode ID: 0bebdcbb316c3bf9b84abf947282ed921760b0615444345e141678927faed78c
                                                                                    • Instruction ID: f9ab5ecc9df886c90699751e030b5206a39bb39015e87ccb90230439a13da61e
                                                                                    • Opcode Fuzzy Hash: 0bebdcbb316c3bf9b84abf947282ed921760b0615444345e141678927faed78c
                                                                                    • Instruction Fuzzy Hash: EBA29575A00228DFDB65CF69C984A9DBBB2FF89300F1581D9D509AB365DB31AE81CF40

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1817 5008598-50085d6 1819 50085d8 1817->1819 1820 50085dd-50086ff 1817->1820 1819->1820 1824 5008701-5008717 1820->1824 1825 5008723-500872f 1820->1825 2102 500871d call 500b128 1824->2102 2103 500871d call 500b138 1824->2103 1826 5008731 1825->1826 1827 5008736-500873b 1825->1827 1826->1827 1828 5008773-50087bc 1827->1828 1829 500873d-5008749 1827->1829 1839 50087c3-5008a88 1828->1839 1840 50087be 1828->1840 1831 5008750-500876e 1829->1831 1832 500874b 1829->1832 1833 5009ed7-5009edd 1831->1833 1832->1831 1835 5009f08 1833->1835 1836 5009edf-5009eff 1833->1836 1836->1835 1865 50094b8-50094c4 1839->1865 1840->1839 1866 50094ca-5009502 1865->1866 1867 5008a8d-5008a99 1865->1867 1876 50095dc-50095e2 1866->1876 1868 5008aa0-5008bc5 1867->1868 1869 5008a9b 1867->1869 1903 5008c05-5008c8e 1868->1903 1904 5008bc7-5008bff 1868->1904 1869->1868 1877 5009507-5009584 1876->1877 1878 50095e8-5009620 1876->1878 1893 5009586-500958a 1877->1893 1894 50095b7-50095d9 1877->1894 1888 500997e-5009984 1878->1888 1890 5009625-5009827 1888->1890 1891 500998a-50099d2 1888->1891 1985 50098c6-50098ca 1890->1985 1986 500982d-50098c1 1890->1986 1901 50099d4-5009a47 1891->1901 1902 5009a4d-5009a98 1891->1902 1893->1894 1898 500958c-50095b4 1893->1898 1894->1876 1898->1894 1901->1902 1923 5009ea1-5009ea7 1902->1923 1930 5008c90-5008c98 1903->1930 1931 5008c9d-5008d21 1903->1931 1904->1903 1926 5009a9d-5009b1f 1923->1926 1927 5009ead-5009ed5 1923->1927 1945 5009b21-5009b3c 1926->1945 1946 5009b47-5009b53 1926->1946 1927->1833 1934 50094a9-50094b5 1930->1934 1966 5008d30-5008db4 1931->1966 1967 5008d23-5008d2b 1931->1967 1934->1865 1945->1946 1947 5009b55 1946->1947 1948 5009b5a-5009b66 1946->1948 1947->1948 1952 5009b68-5009b74 1948->1952 1953 5009b79-5009b88 1948->1953 1957 5009e88-5009e9e 1952->1957 1954 5009b91-5009e69 1953->1954 1955 5009b8a 1953->1955 1988 5009e74-5009e80 1954->1988 1955->1954 1958 5009cf0-5009d59 1955->1958 1959 5009c82-5009ceb 1955->1959 1960 5009c05-5009c7d 1955->1960 1961 5009b97-5009c00 1955->1961 1962 5009d5e-5009dc6 1955->1962 1957->1923 1958->1988 1959->1988 1960->1988 1961->1988 1996 5009e3a-5009e40 1962->1996 2010 5008dc3-5008e47 1966->2010 2011 5008db6-5008dbe 1966->2011 1967->1934 1991 5009927-5009964 1985->1991 1992 50098cc-5009925 1985->1992 2008 5009965-500997b 1986->2008 1988->1957 1991->2008 1992->2008 2001 5009e42-5009e4c 1996->2001 2002 5009dc8-5009e26 1996->2002 2001->1988 2015 5009e28 2002->2015 2016 5009e2d-5009e37 2002->2016 2008->1888 2023 5008e56-5008eda 2010->2023 2024 5008e49-5008e51 2010->2024 2011->1934 2015->2016 2016->1996 2030 5008ee9-5008f6d 2023->2030 2031 5008edc-5008ee4 2023->2031 2024->1934 2037 5008f7c-5009000 2030->2037 2038 5008f6f-5008f77 2030->2038 2031->1934 2044 5009002-500900a 2037->2044 2045 500900f-5009093 2037->2045 2038->1934 2044->1934 2051 50090a2-5009126 2045->2051 2052 5009095-500909d 2045->2052 2058 5009135-50091b9 2051->2058 2059 5009128-5009130 2051->2059 2052->1934 2065 50091c8-500924c 2058->2065 2066 50091bb-50091c3 2058->2066 2059->1934 2072 500925b-50092df 2065->2072 2073 500924e-5009256 2065->2073 2066->1934 2079 50092e1-50092e9 2072->2079 2080 50092ee-5009372 2072->2080 2073->1934 2079->1934 2086 5009381-5009405 2080->2086 2087 5009374-500937c 2080->2087 2093 5009414-5009498 2086->2093 2094 5009407-500940f 2086->2094 2087->1934 2100 50094a4-50094a6 2093->2100 2101 500949a-50094a2 2093->2101 2094->1934 2100->1934 2101->1934 2102->1825 2103->1825
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 2$$^q
                                                                                    • API String ID: 0-1071376767
                                                                                    • Opcode ID: 464747284b531ccdb5e12ec884e9664c69162a5c53fb3254e764b1268615a097
                                                                                    • Instruction ID: 4813410d73b8577a57f70edd042c1457351bd94ec43b573b8b9259a490472d96
                                                                                    • Opcode Fuzzy Hash: 464747284b531ccdb5e12ec884e9664c69162a5c53fb3254e764b1268615a097
                                                                                    • Instruction Fuzzy Hash: 38E2C274E052288FDB65DF69E884B9ABBF6FB88300F1091E9D509A7355DB305E85CF80

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2134 49ca368-49ca389 2135 49ca38b 2134->2135 2136 49ca390-49ca420 call 49caec9 2134->2136 2135->2136 2141 49ca426-49ca473 2136->2141 2144 49ca475-49ca480 2141->2144 2145 49ca482 2141->2145 2146 49ca48c-49ca5a7 2144->2146 2145->2146 2157 49ca5b9-49ca5e4 2146->2157 2158 49ca5a9-49ca5af 2146->2158 2159 49cada7-49cadc3 2157->2159 2158->2157 2160 49ca5e9-49ca74c call 49c8e30 2159->2160 2161 49cadc9-49cade4 2159->2161 2172 49ca75e-49ca8ea call 49c6708 call 49c3a40 2160->2172 2173 49ca74e-49ca754 2160->2173 2185 49ca8ec-49ca8f0 2172->2185 2186 49ca94f-49ca959 2172->2186 2173->2172 2187 49ca8f8-49ca94a 2185->2187 2188 49ca8f2-49ca8f3 2185->2188 2189 49cab80-49cab9f 2186->2189 2190 49cac25-49cac90 2187->2190 2188->2190 2191 49ca95e-49caaa4 call 49c8e30 2189->2191 2192 49caba5-49cabcf 2189->2192 2209 49caca2-49caced 2190->2209 2210 49cac92-49cac98 2190->2210 2221 49cab79-49cab7a 2191->2221 2222 49caaaa-49cab76 call 49c8e30 2191->2222 2198 49cabd1-49cac1f 2192->2198 2199 49cac22-49cac23 2192->2199 2198->2199 2199->2190 2212 49cad8c-49cada4 2209->2212 2213 49cacf3-49cad8b 2209->2213 2210->2209 2212->2159 2213->2212 2221->2189 2222->2221
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: fcq$8
                                                                                    • API String ID: 0-89531850
                                                                                    • Opcode ID: 84b095df11072975a1202af758fa5ecb4bcc2025553bd31d919af1478e39d1de
                                                                                    • Instruction ID: d39c6c0eecebf367c48caf8aaadb9ad87e904086bcc61b758f0e6b5b6f6d0d22
                                                                                    • Opcode Fuzzy Hash: 84b095df11072975a1202af758fa5ecb4bcc2025553bd31d919af1478e39d1de
                                                                                    • Instruction Fuzzy Hash: 6C52E875E012298FDB65DF69D850AD9B7B2FF89304F1085EAD909A7354DB30AE81CF80
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: fcq$h
                                                                                    • API String ID: 0-1849521214
                                                                                    • Opcode ID: 8d833edf545f54df9dcbcc9d035f3f700cad85b290c4706dddd01b99f4747654
                                                                                    • Instruction ID: 16ddbb38ae160fd0ac745c769a02914b64da581107a68191b04cdb3517fcdb50
                                                                                    • Opcode Fuzzy Hash: 8d833edf545f54df9dcbcc9d035f3f700cad85b290c4706dddd01b99f4747654
                                                                                    • Instruction Fuzzy Hash: 07712975E04618CBEB64DF69D850BDAB7B2FF89300F1081AAD908A7354DB306E85CF91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (bq
                                                                                    • API String ID: 0-149360118
                                                                                    • Opcode ID: ebd6396d50d89cddf06593fbb1bc11dfa606704cd73207e7f0228a212e1fe03a
                                                                                    • Instruction ID: 72fdfa5702cf6c1c8947b38035acc763431ebba173eda02df355b62140ea0762
                                                                                    • Opcode Fuzzy Hash: ebd6396d50d89cddf06593fbb1bc11dfa606704cd73207e7f0228a212e1fe03a
                                                                                    • Instruction Fuzzy Hash: 44427970B002158FCB19DF69C49576EFBF2FF88300F248929E95A973A1DB34A945CB84
                                                                                    APIs
                                                                                    • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 049CD959
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 2706961497-0
                                                                                    • Opcode ID: 70e3a8919d2ff55446a9b03364669cdbbbd687efd91657db46e71e8b70c1de64
                                                                                    • Instruction ID: 80ab4ce817eff8423b5a7d9c1041d4c0c8af89000bb3cbd4ae49fe72e9d0c997
                                                                                    • Opcode Fuzzy Hash: 70e3a8919d2ff55446a9b03364669cdbbbd687efd91657db46e71e8b70c1de64
                                                                                    • Instruction Fuzzy Hash: BF2123B5D013499FCB10DFAAD980ADEFBF5FF48310F20842AE859A7210D775A940CBA1
                                                                                    APIs
                                                                                    • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 049CD959
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 2706961497-0
                                                                                    • Opcode ID: 30ac84955f25b52d1099e7e31dbcf09457ea920693ca6ab2de42fb3039169a1c
                                                                                    • Instruction ID: 01dd29a742b8570f91436a52342d759f3848633565e59b3fd81971b296a39a3f
                                                                                    • Opcode Fuzzy Hash: 30ac84955f25b52d1099e7e31dbcf09457ea920693ca6ab2de42fb3039169a1c
                                                                                    • Instruction Fuzzy Hash: 712100B5D013499FCB10DFAAD984ADEFBF5FF48310F20842AE859A7210C775A940CBA5
                                                                                    APIs
                                                                                    • NtResumeThread.NTDLL(?,?), ref: 049CFA8E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: 8006ad6d67010b2f5c595a31e5e24b01f9914c017b3c37672ffdb6172300a47f
                                                                                    • Instruction ID: 77a8a1cb3f6ba70f639ac6d097d005aaacd45a948e290eda70c3e6b4b732f3e5
                                                                                    • Opcode Fuzzy Hash: 8006ad6d67010b2f5c595a31e5e24b01f9914c017b3c37672ffdb6172300a47f
                                                                                    • Instruction Fuzzy Hash: 101136B1D003098FCB20DFAAC444ADEFBF9EF88320F10842AD459A7254DB74A945CFA5
                                                                                    APIs
                                                                                    • NtResumeThread.NTDLL(?,?), ref: 049CFA8E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: 8b2ed2ca6e0a8a98a7376f85fea7dd958185662dbef39b42e0ccd80bd7ee7aad
                                                                                    • Instruction ID: 22cbe8b31c5266c446b06d1c902963d7c5b22b2e7286a29b9dd2944dbcc9658f
                                                                                    • Opcode Fuzzy Hash: 8b2ed2ca6e0a8a98a7376f85fea7dd958185662dbef39b42e0ccd80bd7ee7aad
                                                                                    • Instruction Fuzzy Hash: F91117B1D003098FDB20DFAAC44469EFBF5EF48324F10842ED459A7254D775A944CFA5
                                                                                    APIs
                                                                                    • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 049CD959
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 2706961497-0
                                                                                    • Opcode ID: 74e8717a53e03a26d03972da5dfae5e6b643ab9a9c54fc6ef406c02574f61fd6
                                                                                    • Instruction ID: 144741279c8e8f34a5ff27e1fd594e64d2332e2c0ddcdd5fae5309c3094c1722
                                                                                    • Opcode Fuzzy Hash: 74e8717a53e03a26d03972da5dfae5e6b643ab9a9c54fc6ef406c02574f61fd6
                                                                                    • Instruction Fuzzy Hash: E101493A9053448FD721EB68E4543EDBFA1AF52324F24857AC189CF262C6356C45C752
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899750353.00000000065B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65b0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Deq
                                                                                    • API String ID: 0-948982800
                                                                                    • Opcode ID: aa6a288384fcfc1c5b3c160693b69596c5ca3b44106647c6d8ca3abc1f6834bc
                                                                                    • Instruction ID: 216ce0f135461fb8a451253bf0df992a764f63466f830d43437560111aa9b589
                                                                                    • Opcode Fuzzy Hash: aa6a288384fcfc1c5b3c160693b69596c5ca3b44106647c6d8ca3abc1f6834bc
                                                                                    • Instruction Fuzzy Hash: 04D1BD74E00219CFDB54DFA9D994A9DBBF2FF88310F2084A9D409AB365DB31A981CF51
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6c8ac804d76efc0018698454eb8310116e94754c30e5ae14f8243c359704cde3
                                                                                    • Instruction ID: edaa87a1fc0d468ebfbb7b97d936f3d7860aba94c6ff085f469c9f48a7d1866d
                                                                                    • Opcode Fuzzy Hash: 6c8ac804d76efc0018698454eb8310116e94754c30e5ae14f8243c359704cde3
                                                                                    • Instruction Fuzzy Hash: 4B52C074A042288FDB65DF28D988B9AB7B6FB48301F1091D9D90DA7355DB30AE85CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 191195e3c4635d4ea153bf22ba0707c6dcfc6dc72c2c857efd456039404865d8
                                                                                    • Instruction ID: 7a0a17f088aaa85dab5a0f9b6a4ccd2bc3792a3ab2195bf90a5fafb143f90c11
                                                                                    • Opcode Fuzzy Hash: 191195e3c4635d4ea153bf22ba0707c6dcfc6dc72c2c857efd456039404865d8
                                                                                    • Instruction Fuzzy Hash: 7BD1F474E04218CFDB14DFA9D844BADBBF2FB49300F2095A9D909AB255DB35AE85CF40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1b2362eb158d7ae091482d9b02f1022177a81c350e89435e01d64c8041219bfa
                                                                                    • Instruction ID: 10c6d91cfd349b52b7dca1cb70dba1770d82edee6265cb644e3e99fd2087da5f
                                                                                    • Opcode Fuzzy Hash: 1b2362eb158d7ae091482d9b02f1022177a81c350e89435e01d64c8041219bfa
                                                                                    • Instruction Fuzzy Hash: B7D10574E04218CFDB14DFA9D844BADBBF6FB49300F2095A9D909AB255DB31AE85CF40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7824d82eb5ed63303c1382fc1993a345a9a380718e7ac1da7e69527ada8e1e66
                                                                                    • Instruction ID: 737efac91c47acfb8e22a0c1564d5979621698938b9bbbf857718d0e6f181f59
                                                                                    • Opcode Fuzzy Hash: 7824d82eb5ed63303c1382fc1993a345a9a380718e7ac1da7e69527ada8e1e66
                                                                                    • Instruction Fuzzy Hash: 4DC10774E04218CFDB14DFA9D844BADBBF2FB49300F2095A9D909AB255DB35AE85CF40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 107125650fade2419b8491aeef973ddaf53fbd0594419123ea5c39ea5fff9577
                                                                                    • Instruction ID: a6ea391796eb0195f4627b94652b7019ab82ebe2e9dfa47206e0151e5b83adfe
                                                                                    • Opcode Fuzzy Hash: 107125650fade2419b8491aeef973ddaf53fbd0594419123ea5c39ea5fff9577
                                                                                    • Instruction Fuzzy Hash: 8041E9B4D05218CFEB54CFAAC844BDDBBF6BB89304F24D4AAD809AB264D7745A45DF00

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1165 277cb08-277cba7 GetCurrentProcess 1169 277cbb0-277cbe4 GetCurrentThread 1165->1169 1170 277cba9-277cbaf 1165->1170 1171 277cbe6-277cbec 1169->1171 1172 277cbed-277cc21 GetCurrentProcess 1169->1172 1170->1169 1171->1172 1174 277cc23-277cc29 1172->1174 1175 277cc2a-277cc45 call 277cce7 1172->1175 1174->1175 1177 277cc4b-277cc7a GetCurrentThreadId 1175->1177 1179 277cc83-277cce5 1177->1179 1180 277cc7c-277cc82 1177->1180 1180->1179
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32 ref: 0277CB96
                                                                                    • GetCurrentThread.KERNEL32 ref: 0277CBD3
                                                                                    • GetCurrentProcess.KERNEL32 ref: 0277CC10
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0277CC69
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867535321.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_2770000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: Current$ProcessThread
                                                                                    • String ID:
                                                                                    • API String ID: 2063062207-0
                                                                                    • Opcode ID: 2e82c555034480b755ef2fe54f2231f486fc3d4566408d6a48fa3e4b5023383a
                                                                                    • Instruction ID: 114ee0256f363eabe21bd62c801c39aca47b9ef0bfc1d8148068af4c2f603f15
                                                                                    • Opcode Fuzzy Hash: 2e82c555034480b755ef2fe54f2231f486fc3d4566408d6a48fa3e4b5023383a
                                                                                    • Instruction Fuzzy Hash: 215177B49002498FDB15CFA9D648BDEBFF5EF48304F2484A9E019AB2A0D7749984CF65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1187 277cb18-277cba7 GetCurrentProcess 1191 277cbb0-277cbe4 GetCurrentThread 1187->1191 1192 277cba9-277cbaf 1187->1192 1193 277cbe6-277cbec 1191->1193 1194 277cbed-277cc21 GetCurrentProcess 1191->1194 1192->1191 1193->1194 1196 277cc23-277cc29 1194->1196 1197 277cc2a-277cc45 call 277cce7 1194->1197 1196->1197 1199 277cc4b-277cc7a GetCurrentThreadId 1197->1199 1201 277cc83-277cce5 1199->1201 1202 277cc7c-277cc82 1199->1202 1202->1201
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32 ref: 0277CB96
                                                                                    • GetCurrentThread.KERNEL32 ref: 0277CBD3
                                                                                    • GetCurrentProcess.KERNEL32 ref: 0277CC10
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0277CC69
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867535321.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_2770000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: Current$ProcessThread
                                                                                    • String ID:
                                                                                    • API String ID: 2063062207-0
                                                                                    • Opcode ID: 939ce7757bee3c07706bab7c21a11b857e873047560efe229253b76dfecbc4d8
                                                                                    • Instruction ID: b43005ecbc90bd34958e52c3d54ef0fd1d090e3b4c39e3ae0f2e2c1f15788788
                                                                                    • Opcode Fuzzy Hash: 939ce7757bee3c07706bab7c21a11b857e873047560efe229253b76dfecbc4d8
                                                                                    • Instruction Fuzzy Hash: 355156B49002098FDB14DFAAD648BEEBBF5EF48304F208469E419A73A0D7749984CF65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1372 277a488-277a497 1373 277a4c3-277a4c7 1372->1373 1374 277a499-277a4a6 call 27797e4 1372->1374 1375 277a4db-277a51c 1373->1375 1376 277a4c9-277a4d3 1373->1376 1381 277a4bc 1374->1381 1382 277a4a8 1374->1382 1383 277a51e-277a526 1375->1383 1384 277a529-277a537 1375->1384 1376->1375 1381->1373 1428 277a4ae call 277a711 1382->1428 1429 277a4ae call 277a720 1382->1429 1383->1384 1385 277a55b-277a55d 1384->1385 1386 277a539-277a53e 1384->1386 1389 277a560-277a567 1385->1389 1390 277a540-277a547 call 27797f0 1386->1390 1391 277a549 1386->1391 1387 277a4b4-277a4b6 1387->1381 1388 277a5f8-277a605 1387->1388 1402 277a60b-277a670 1388->1402 1393 277a574-277a57b 1389->1393 1394 277a569-277a571 1389->1394 1392 277a54b-277a559 1390->1392 1391->1392 1392->1389 1396 277a57d-277a585 1393->1396 1397 277a588-277a591 call 2779800 1393->1397 1394->1393 1396->1397 1403 277a593-277a59b 1397->1403 1404 277a59e-277a5a3 1397->1404 1422 277a672-277a6b8 1402->1422 1403->1404 1405 277a5a5-277a5ac 1404->1405 1406 277a5c1-277a5c5 1404->1406 1405->1406 1408 277a5ae-277a5be call 2779810 call 2779820 1405->1408 1430 277a5c8 call 277a9f1 1406->1430 1431 277a5c8 call 277aa20 1406->1431 1408->1406 1409 277a5cb-277a5ce 1412 277a5f1-277a5f7 1409->1412 1413 277a5d0-277a5ee 1409->1413 1413->1412 1423 277a6c0-277a6eb GetModuleHandleW 1422->1423 1424 277a6ba-277a6bd 1422->1424 1425 277a6f4-277a708 1423->1425 1426 277a6ed-277a6f3 1423->1426 1424->1423 1426->1425 1428->1387 1429->1387 1430->1409 1431->1409
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0277A6DE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867535321.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_2770000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID: 8Q$8Q
                                                                                    • API String ID: 4139908857-250438889
                                                                                    • Opcode ID: 51dc7b6d9d0a8a69b4275f31bffe30201cd03145af534acf780ee70ea9ffd311
                                                                                    • Instruction ID: 01c8db6a85d98c45c89964d9f25af8a89333a9068befc214178840f9d4c54919
                                                                                    • Opcode Fuzzy Hash: 51dc7b6d9d0a8a69b4275f31bffe30201cd03145af534acf780ee70ea9ffd311
                                                                                    • Instruction Fuzzy Hash: CC812370A00B158FEB24DF29D14575ABBF2BF88304F108A2DD48ADBB50D775E945CB90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1432 49673e0-4967408 1434 4967456-4967464 1432->1434 1435 496740a-4967451 1432->1435 1436 4967466-4967471 call 4964b08 1434->1436 1437 4967473 1434->1437 1484 49678ad-49678b4 1435->1484 1438 4967475-496747c 1436->1438 1437->1438 1441 4967565-4967569 1438->1441 1442 4967482-4967486 1438->1442 1447 49675bf-49675c9 1441->1447 1448 496756b-496757a call 4962d10 1441->1448 1445 49678b5-49678dd 1442->1445 1446 496748c-4967490 1442->1446 1456 49678e4-496790e 1445->1456 1449 49674a2-4967500 call 4964848 call 49652b0 1446->1449 1450 4967492-496749c 1446->1450 1451 4967602-4967628 1447->1451 1452 49675cb-49675da call 49624c8 1447->1452 1463 496757e-4967583 1448->1463 1494 4967506-4967560 1449->1494 1495 4967973-4967988 1449->1495 1450->1449 1450->1456 1475 4967635 1451->1475 1476 496762a-4967633 1451->1476 1467 4967916 1452->1467 1468 49675e0-49675fd 1452->1468 1456->1467 1469 4967585-49675ba call 49672b0 1463->1469 1470 496757c 1463->1470 1473 496791e-496792c 1467->1473 1468->1484 1469->1484 1470->1463 1492 4967934-496796c 1473->1492 1483 4967637-496765f 1475->1483 1476->1483 1500 4967665-496767e 1483->1500 1501 4967730-4967734 1483->1501 1492->1495 1494->1484 1495->1473 1502 496798a-496799d 1495->1502 1500->1501 1523 4967684-4967693 call 49622f0 1500->1523 1503 4967736-496774f 1501->1503 1504 49677ae-49677b8 1501->1504 1506 49679a7-49679ad 1502->1506 1507 496799f-49679a5 1502->1507 1503->1504 1532 4967751-4967760 call 49622f0 1503->1532 1509 4967815-496781e 1504->1509 1510 49677ba-49677c4 1504->1510 1507->1506 1514 49679ae-49679eb 1507->1514 1512 4967856-49678a3 1509->1512 1513 4967820-496784e call 4964040 call 4964060 1509->1513 1521 49677c6-49677c8 1510->1521 1522 49677ca-49677dc 1510->1522 1575 49678a5 call 4967c30 1512->1575 1576 49678a5 call 4967c21 1512->1576 1513->1512 1528 49677de-49677e0 1521->1528 1522->1528 1541 4967695-496769b 1523->1541 1542 49676ab-49676c0 1523->1542 1536 49677e2-49677e6 1528->1536 1537 496780e-4967813 1528->1537 1548 4967762-4967768 1532->1548 1549 4967778-4967783 1532->1549 1544 4967804-4967809 call 49610f0 1536->1544 1545 49677e8-4967801 1536->1545 1537->1509 1537->1510 1539 49678ab 1539->1484 1550 496769f-49676a1 1541->1550 1551 496769d 1541->1551 1554 49676f4-49676fd 1542->1554 1555 49676c2-49676ee call 4963190 1542->1555 1544->1537 1545->1544 1559 496776c-496776e 1548->1559 1560 496776a 1548->1560 1549->1495 1561 4967789-49677ac 1549->1561 1550->1542 1551->1542 1554->1495 1558 4967703-496772a 1554->1558 1555->1492 1555->1554 1558->1501 1558->1523 1559->1549 1560->1549 1561->1504 1561->1532 1575->1539 1576->1539
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Hbq$Hbq$Hbq
                                                                                    • API String ID: 0-2297679979
                                                                                    • Opcode ID: 46545f6c958384d8c30c2dc738f3d03df39e5e2be9c52dedba52fece7e614e11
                                                                                    • Instruction ID: 771ed907ce538e9d1877b3b2fe3303188a09352e68c16ef7b4a60f69d73f44e7
                                                                                    • Opcode Fuzzy Hash: 46545f6c958384d8c30c2dc738f3d03df39e5e2be9c52dedba52fece7e614e11
                                                                                    • Instruction Fuzzy Hash: 6F126F31A002089FDB24DFA5C58466EBBF6FF88304F24856DE40AAB395DB35ED45CB51

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1577 4969218-4969255 1579 4969277-496928d call 4969020 1577->1579 1580 4969257-496925c call 4969b88 1577->1580 1586 4969603-4969617 1579->1586 1587 4969293-496929f 1579->1587 1582 4969262-4969264 1580->1582 1582->1579 1584 4969266-496926e 1582->1584 1584->1579 1594 4969657-4969660 1586->1594 1588 49692a5-49692a8 1587->1588 1589 49693d0-49693d7 1587->1589 1593 49692ab-49692b4 1588->1593 1591 4969506-4969540 call 4968a28 1589->1591 1592 49693dd-49693e6 1589->1592 1690 4969543 call 496b9d0 1591->1690 1691 4969543 call 496b9c1 1591->1691 1592->1591 1595 49693ec-49694f8 call 4968a28 call 4968fb8 call 4968a28 1592->1595 1597 49692ba-49692ce 1593->1597 1598 49696f8 1593->1598 1599 4969625-496962e 1594->1599 1600 4969662-4969669 1594->1600 1688 4969503 1595->1688 1689 49694fa 1595->1689 1610 49692d4-4969369 call 4969020 * 2 call 4968a28 call 4968fb8 call 4969060 call 4969108 call 4969170 1597->1610 1611 49693c0-49693ca 1597->1611 1602 49696fd-4969701 1598->1602 1599->1598 1604 4969634-4969646 1599->1604 1605 49696b7-49696be 1600->1605 1606 496966b-49696ae call 4968a28 1600->1606 1608 4969703 1602->1608 1609 496970c 1602->1609 1623 4969656 1604->1623 1624 4969648-496964d 1604->1624 1612 49696e3-49696f6 1605->1612 1613 49696c0-49696d0 1605->1613 1606->1605 1608->1609 1620 496970d 1609->1620 1667 496936b-4969383 call 4969108 call 4968a28 call 4968cd8 1610->1667 1668 4969388-49693bb call 4969170 1610->1668 1611->1589 1611->1593 1612->1602 1613->1612 1627 49696d2-49696da 1613->1627 1620->1620 1623->1594 1693 4969650 call 496c170 1624->1693 1694 4969650 call 496c16a 1624->1694 1627->1612 1635 4969549-49695fa call 4968a28 1635->1586 1667->1668 1668->1611 1688->1591 1689->1688 1690->1635 1691->1635 1693->1623 1694->1623
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 4'^q$4'^q$4'^q
                                                                                    • API String ID: 0-1196845430
                                                                                    • Opcode ID: 03a4e06e7d006bd384e095d839568a7a522a681c3156c24b583b5f12d8476cc7
                                                                                    • Instruction ID: 8b0c4bb9dae869cab656a1888b5f3456e61b0e41e718f61825a6e93901754d76
                                                                                    • Opcode Fuzzy Hash: 03a4e06e7d006bd384e095d839568a7a522a681c3156c24b583b5f12d8476cc7
                                                                                    • Instruction Fuzzy Hash: 7DF1DD74A50218DFDB04DFA4D598A9DBBB2FF88304F158569E406AB3A5DF71EC82CB40

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1695 496d800-496d810 1696 496d816-496d81a 1695->1696 1697 496d929-496d94e 1695->1697 1698 496d955 1696->1698 1699 496d820-496d829 1696->1699 1697->1698 1703 496d95e-496d97a 1698->1703 1701 496d981-496d9b7 1699->1701 1702 496d82f-496d856 1699->1702 1717 496d9be-496d9d4 1701->1717 1711 496d91e-496d928 1702->1711 1712 496d85c-496d85e 1702->1712 1703->1701 1714 496d860-496d863 1712->1714 1715 496d87f-496d881 1712->1715 1714->1717 1718 496d869-496d873 1714->1718 1719 496d884-496d888 1715->1719 1717->1703 1726 496d9d6-496da14 1717->1726 1718->1717 1720 496d879-496d87d 1718->1720 1721 496d88a-496d899 1719->1721 1722 496d8e9-496d8f5 1719->1722 1720->1715 1720->1719 1721->1717 1730 496d89f-496d8e6 call 4961120 1721->1730 1722->1717 1725 496d8fb-496d918 call 4961120 1722->1725 1725->1711 1725->1712 1736 496da16-496da1b 1726->1736 1737 496da38-496da4f 1726->1737 1730->1722 1812 496da1e call 496dcd0 1736->1812 1813 496da1e call 496dce0 1736->1813 1745 496da55-496db3b call 4969020 call 4968a28 * 2 call 4969060 call 496c838 call 4968a28 call 496b9d0 call 49698c8 1737->1745 1746 496db40-496db50 1737->1746 1740 496da24-496da2a 1814 496da2d call 496e0a0 1740->1814 1815 496da2d call 496df18 1740->1815 1816 496da2d call 496e078 1740->1816 1744 496da33 1747 496dc63-496dc6e 1744->1747 1745->1746 1754 496db56-496dc30 call 4969020 * 2 call 49697d8 call 4968a28 * 2 call 4968cd8 call 4969170 call 4968a28 1746->1754 1755 496dc3e-496dc5a call 4968a28 1746->1755 1756 496dc70-496dc80 1747->1756 1757 496dc9d-496dcbe call 4969170 1747->1757 1809 496dc32 1754->1809 1810 496dc3b 1754->1810 1755->1747 1769 496dc82-496dc88 1756->1769 1770 496dc90-496dc98 call 49698c8 1756->1770 1769->1770 1770->1757 1809->1810 1810->1755 1812->1740 1813->1740 1814->1744 1815->1744 1816->1744
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (bq$(bq$Hbq
                                                                                    • API String ID: 0-2835675688
                                                                                    • Opcode ID: 8c5eb1ed1ff628ec0c2eba6e2a4e59a190a1bbd78a45a6d0c237726925a62a14
                                                                                    • Instruction ID: 926066dbde7574f5a4dd085e0c64a696d234f491a1913a5df7f7bb5e641770e5
                                                                                    • Opcode Fuzzy Hash: 8c5eb1ed1ff628ec0c2eba6e2a4e59a190a1bbd78a45a6d0c237726925a62a14
                                                                                    • Instruction Fuzzy Hash: 0CE12034B01209DFDB08EF64D59499EBBB2FF89300F118569E416AB364DB34ED81CB91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2230 4963539-4963574 2232 4963576 2230->2232 2233 496357d-4963590 call 49631c8 2230->2233 2232->2233 2236 4963596-49635a9 2233->2236 2237 49636d4-49636db 2233->2237 2245 49635b7-49635d1 2236->2245 2246 49635ab-49635b2 2236->2246 2238 4963975-496397c 2237->2238 2239 49636e1-49636f6 2237->2239 2240 496397e-4963987 2238->2240 2241 49639eb-49639f2 2238->2241 2252 4963716-496371c 2239->2252 2253 49636f8-49636fa 2239->2253 2240->2241 2243 4963989-496399c 2240->2243 2247 4963a8e-4963a95 2241->2247 2248 49639f8-4963a01 2241->2248 2243->2241 2265 496399e-49639e3 call 4960b20 2243->2265 2269 49635d3-49635d6 2245->2269 2270 49635d8-49635e5 2245->2270 2254 49636cd 2246->2254 2250 4963a97-4963aa8 2247->2250 2251 4963ab1-4963ab7 2247->2251 2248->2247 2249 4963a07-4963a1a 2248->2249 2272 4963a1c-4963a2b 2249->2272 2273 4963a2d-4963a31 2249->2273 2250->2251 2274 4963aaa 2250->2274 2257 4963ac9-4963ad2 2251->2257 2258 4963ab9-4963abf 2251->2258 2259 49637e4-49637e8 2252->2259 2260 4963722-4963724 2252->2260 2253->2252 2256 49636fc-4963713 2253->2256 2254->2237 2256->2252 2266 4963ad5-4963b31 2258->2266 2267 4963ac1-4963ac7 2258->2267 2259->2238 2262 49637ee-49637f0 2259->2262 2260->2259 2268 496372a-4963744 2260->2268 2262->2238 2271 49637f6-49637ff 2262->2271 2265->2241 2308 49639e5-49639e8 2265->2308 2333 4963b39-4963b4a 2266->2333 2267->2257 2267->2266 2384 4963746 call 4963d08 2268->2384 2385 4963746 call 4963cf9 2268->2385 2276 49635e7-49635fb 2269->2276 2270->2276 2277 4963952-4963958 2271->2277 2272->2273 2278 4963a33-4963a35 2273->2278 2279 4963a51-4963a53 2273->2279 2274->2251 2276->2254 2303 4963601-4963655 2276->2303 2288 496395a-4963969 2277->2288 2289 496396b 2277->2289 2278->2279 2286 4963a37-4963a4e 2278->2286 2279->2247 2287 4963a55-4963a5b 2279->2287 2286->2279 2287->2247 2292 4963a5d-4963a8b 2287->2292 2290 496396d-496396f 2288->2290 2289->2290 2290->2238 2295 4963804-4963812 call 49622f0 2290->2295 2292->2247 2293 496374c-49637a0 call 4960b20 * 4 2332 49637a5-49637ab 2293->2332 2312 4963814-496381a 2295->2312 2313 496382a-4963844 2295->2313 2343 4963657-4963659 2303->2343 2344 4963663-4963667 2303->2344 2308->2241 2316 496381e-4963820 2312->2316 2317 496381c 2312->2317 2313->2277 2322 496384a-496384e 2313->2322 2316->2313 2317->2313 2326 4963850-4963859 2322->2326 2327 496386f 2322->2327 2330 4963860-4963863 2326->2330 2331 496385b-496385e 2326->2331 2328 4963872-496388c 2327->2328 2328->2277 2351 4963892-4963913 call 4960b20 * 4 2328->2351 2335 496386d 2330->2335 2331->2335 2337 49637c2-49637e1 call 4960b20 2332->2337 2338 49637ad-49637bf call 4960b20 2332->2338 2347 4963b4c-4963b56 2333->2347 2348 4963b58 2333->2348 2335->2328 2337->2259 2338->2337 2343->2344 2344->2254 2350 4963669-4963681 2344->2350 2352 4963b5d-4963b5f 2347->2352 2348->2352 2350->2254 2358 4963683-496368f 2350->2358 2378 4963915-4963927 call 4960b20 2351->2378 2379 496392a-4963950 call 4960b20 2351->2379 2353 4963b66-4963b6b 2352->2353 2354 4963b61-4963b64 2352->2354 2355 4963b71-4963b9e 2353->2355 2354->2355 2360 4963691-4963694 2358->2360 2361 496369e-49636a4 2358->2361 2360->2361 2363 49636a6-49636a9 2361->2363 2364 49636ac-49636b5 2361->2364 2363->2364 2367 49636b7-49636ba 2364->2367 2368 49636c4-49636ca 2364->2368 2367->2368 2368->2254 2378->2379 2379->2238 2379->2277 2384->2293 2385->2293
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $^q$$^q
                                                                                    • API String ID: 0-355816377
                                                                                    • Opcode ID: 0bda9ba27de922c0b981501ec1706661999e51fe36576900f76a5aef4f35582c
                                                                                    • Instruction ID: bcbf3d6fd463acb526eca876b6724d844a01e541da7f54045e3e7aa709c13ead
                                                                                    • Opcode Fuzzy Hash: 0bda9ba27de922c0b981501ec1706661999e51fe36576900f76a5aef4f35582c
                                                                                    • Instruction Fuzzy Hash: 78125A30A01219CFDF15DFA5D894AADBBF6FF88704F148025E812AB395DB34A986DF50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2386 4966e98-4966eaa 2387 4966ed4-4966ed8 2386->2387 2388 4966eac-4966ecd 2386->2388 2389 4966ee4-4966ef3 2387->2389 2390 4966eda-4966edc 2387->2390 2388->2387 2392 4966ef5 2389->2392 2393 4966eff-4966f2b 2389->2393 2390->2389 2392->2393 2396 4966f31-4966f37 2393->2396 2397 4967158-496719f 2393->2397 2398 4966f3d-4966f43 2396->2398 2399 4967009-496700d 2396->2399 2428 49671b5-49671c1 2397->2428 2429 49671a1 2397->2429 2398->2397 2401 4966f49-4966f56 2398->2401 2402 4967030-4967039 2399->2402 2403 496700f-4967018 2399->2403 2405 4966f5c-4966f65 2401->2405 2406 4966fe8-4966ff1 2401->2406 2408 496705e-4967061 2402->2408 2409 496703b-496705b 2402->2409 2403->2397 2407 496701e-496702e 2403->2407 2405->2397 2411 4966f6b-4966f83 2405->2411 2406->2397 2410 4966ff7-4967003 2406->2410 2412 4967064-496706a 2407->2412 2408->2412 2409->2408 2410->2398 2410->2399 2414 4966f85 2411->2414 2415 4966f8f-4966fa1 2411->2415 2412->2397 2417 4967070-4967083 2412->2417 2414->2415 2415->2406 2424 4966fa3-4966fa9 2415->2424 2417->2397 2419 4967089-4967099 2417->2419 2419->2397 2422 496709f-49670ac 2419->2422 2422->2397 2423 49670b2-49670c7 2422->2423 2423->2397 2437 49670cd-49670f0 2423->2437 2426 4966fb5-4966fbb 2424->2426 2427 4966fab 2424->2427 2426->2397 2434 4966fc1-4966fe5 2426->2434 2427->2426 2432 49671c3 2428->2432 2433 49671cd-49671e9 2428->2433 2430 49671a4-49671a6 2429->2430 2435 49671ea-4967217 call 49622f0 2430->2435 2436 49671a8-49671b3 2430->2436 2432->2433 2448 496722f-4967231 2435->2448 2449 4967219-496721f 2435->2449 2436->2428 2436->2430 2437->2397 2442 49670f2-49670fd 2437->2442 2445 496714e-4967155 2442->2445 2446 49670ff-4967109 2442->2446 2446->2445 2454 496710b-4967121 2446->2454 2472 4967233 call 49672b0 2448->2472 2473 4967233 call 49680c0 2448->2473 2474 4967233 call 49672a1 2448->2474 2475 4967233 call 4968051 2448->2475 2450 4967223-4967225 2449->2450 2451 4967221 2449->2451 2450->2448 2451->2448 2453 4967239-496723d 2455 496723f-4967256 2453->2455 2456 4967288-496728d 2453->2456 2460 4967123 2454->2460 2461 496712d-4967146 2454->2461 2455->2456 2464 4967258-4967262 2455->2464 2459 4967295-4967298 2456->2459 2460->2461 2461->2445 2467 4967264-4967273 2464->2467 2468 4967275-4967285 2464->2468 2467->2468 2472->2453 2473->2453 2474->2453 2475->2453
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (bq$d
                                                                                    • API String ID: 0-3334038649
                                                                                    • Opcode ID: 75dc32f1088de5626384484d1428fd0a7f7da167ae84f0c17c2c186e4c827dc0
                                                                                    • Instruction ID: 3574f8df8ebd720c77400cdc95bff879cfa43b6d93a4d7acb2ed7cc0bd96c01b
                                                                                    • Opcode Fuzzy Hash: 75dc32f1088de5626384484d1428fd0a7f7da167ae84f0c17c2c186e4c827dc0
                                                                                    • Instruction Fuzzy Hash: 37D17A30600606DFCB14CF69C58496AB7F6FF88314B2689A9E45A9B365DB30FC42CF90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2476 4967c30-4967c43 2477 4967c4c-4967c57 2476->2477 2478 4967ca5-4967cbf 2477->2478 2479 4967c59-4967c5b 2477->2479 2492 4967cc1-4967cc7 2478->2492 2493 4967cc9-4967cd8 2478->2493 2480 4967c77-4967c7b 2479->2480 2481 4967c5d-4967c67 2479->2481 2485 4967c9f-4967ca3 2480->2485 2486 4967c7d-4967c83 2480->2486 2483 4967f87-4967fab 2481->2483 2484 4967c6d-4967c71 2481->2484 2494 4967fad-4967fb9 2483->2494 2484->2480 2487 4967df5-4967df8 2484->2487 2485->2478 2485->2479 2486->2483 2488 4967c89-4967c96 2486->2488 2487->2483 2489 4967dfe-4967e76 2487->2489 2488->2485 2500 4967c98 2488->2500 2507 4967e7d-4967ec5 2489->2507 2497 4967cde-4967d17 2492->2497 2493->2497 2493->2507 2498 4967fbb-4967fc1 2494->2498 2499 4968019-496801d 2494->2499 2525 4967d27-4967d3c 2497->2525 2526 4967d19-4967d20 2497->2526 2502 4968027-496804d 2498->2502 2503 4967fc3-4967fca 2498->2503 2499->2494 2501 496801f-4968026 2499->2501 2500->2485 2503->2502 2506 4967fcc-4967fd2 2503->2506 2510 4967fd4-4967fdf 2506->2510 2511 4968013-4968017 2506->2511 2537 4967ecc-4967f02 2507->2537 2510->2502 2514 4967fe1-4967feb 2510->2514 2511->2498 2511->2499 2514->2502 2516 4967fed-496800c 2514->2516 2516->2511 2536 4967d42-4967d63 2525->2536 2525->2537 2526->2525 2527 4967d22-4967d24 2526->2527 2527->2525 2543 4967d94-4967da4 2536->2543 2544 4967d65-4967d72 2536->2544 2556 4967f09-4967f2d 2537->2556 2550 4967da6-4967dc6 2543->2550 2551 4967dc8 2543->2551 2548 4967d74-4967d80 2544->2548 2549 4967d82 2544->2549 2553 4967d87-4967d8a 2548->2553 2549->2553 2554 4967dca-4967ddf 2550->2554 2551->2554 2555 4967d90 2553->2555 2553->2556 2558 4967de1-4967de5 2554->2558 2559 4967deb-4967df2 2554->2559 2555->2543 2560 4967f34-4967f80 2556->2560 2558->2559 2558->2560 2560->2483
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Hbq$Hbq
                                                                                    • API String ID: 0-4258043069
                                                                                    • Opcode ID: 2dc82c57127d804a85d006be58a841c1532aa7cc8737949467bd01342b550aa0
                                                                                    • Instruction ID: 43bd18c2e75727e5db923d4b212f1775d4e6a92758713022b78532e672571331
                                                                                    • Opcode Fuzzy Hash: 2dc82c57127d804a85d006be58a841c1532aa7cc8737949467bd01342b550aa0
                                                                                    • Instruction Fuzzy Hash: A9D1A1307001459FCB04DF69C494A6EBBB6FF88314F1585A9E80A9B3A5DB34FD86CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (_^q$Pl^q
                                                                                    • API String ID: 0-1560878243
                                                                                    • Opcode ID: 8b74a6cfaffa5d8216e99ee9fcc46dee464c6b1cf673e96147b2df02496a65ca
                                                                                    • Instruction ID: e761e738d899212da1adf149a742bf542e97b274a0f3645b9d98174a9ef34c17
                                                                                    • Opcode Fuzzy Hash: 8b74a6cfaffa5d8216e99ee9fcc46dee464c6b1cf673e96147b2df02496a65ca
                                                                                    • Instruction Fuzzy Hash: 29912234B401189FDB14DF69C884A6A7BFABF89710F1440A9E406DB3B5DB71EC82CB95
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (bq$Hbq
                                                                                    • API String ID: 0-4081012451
                                                                                    • Opcode ID: bf7a3d09e394b6ada541050edccedb9b1f239a50a3389d02970cedc2920a97af
                                                                                    • Instruction ID: 2c1e3ca140bd927835536b7a1c4708e2dcd0536fceb8135160f7cd998a0a9eea
                                                                                    • Opcode Fuzzy Hash: bf7a3d09e394b6ada541050edccedb9b1f239a50a3389d02970cedc2920a97af
                                                                                    • Instruction Fuzzy Hash: 585159347002548FD719AF39C49852EBBB6FF89301B2544ACD4069B3A1DF39ED46CBA5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (bq$(bq
                                                                                    • API String ID: 0-4224401849
                                                                                    • Opcode ID: 0b9bf293b6f7abdff076777c30f8f7440df75e369691449ea24705cc3c4d86d4
                                                                                    • Instruction ID: 25437bff34cededd7611e817c90a5e2fbaeb84b2ccff751f49f781b3b239b88b
                                                                                    • Opcode Fuzzy Hash: 0b9bf293b6f7abdff076777c30f8f7440df75e369691449ea24705cc3c4d86d4
                                                                                    • Instruction Fuzzy Hash: 3351CE317002459FDB189F29D854B6E3BA6FF84354F258169E802CB395CF39ED82CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $^q$$^q
                                                                                    • API String ID: 0-355816377
                                                                                    • Opcode ID: ad131f6ee64bb6e437c19395d3ecdcf67d1d51084986947d4dabc57551e378d5
                                                                                    • Instruction ID: 33b74877251251c5cb0699692be6c941ad1ca74022250e9cd1b26f6a2ebd1b63
                                                                                    • Opcode Fuzzy Hash: ad131f6ee64bb6e437c19395d3ecdcf67d1d51084986947d4dabc57551e378d5
                                                                                    • Instruction Fuzzy Hash: 08116135600209DFEB34CE99D464BA9BBF9AF04350F14847AD802CB264D771F984C750
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,bq
                                                                                    • API String ID: 0-2474004448
                                                                                    • Opcode ID: 6ee62885f03870be099648cdf23644190b96fc93a727df4c0c29f2a776e0a179
                                                                                    • Instruction ID: 94743aa89978150c4b861e40d92a8562a7b913c30fd182e6c400a048b1f15e1e
                                                                                    • Opcode Fuzzy Hash: 6ee62885f03870be099648cdf23644190b96fc93a727df4c0c29f2a776e0a179
                                                                                    • Instruction Fuzzy Hash: 99521D75A002288FDB24CF69C985BEDBBF6BF88300F1541E9E509A7351DA349E85CF61
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (_^q
                                                                                    • API String ID: 0-538443824
                                                                                    • Opcode ID: 665826aa7cbfd9558f251b763d4c6a576e69a6e798ad7537dc67a434659fb383
                                                                                    • Instruction ID: 05193f4ed46f5d1448cd5ea28214002e36f4513e2722631869f15ff2cfcda22b
                                                                                    • Opcode Fuzzy Hash: 665826aa7cbfd9558f251b763d4c6a576e69a6e798ad7537dc67a434659fb383
                                                                                    • Instruction Fuzzy Hash: E8228A35B102049FDB04DFA9D494A6DBBF6FF88300F158469E806AB3A1DB71ED80CB94
                                                                                    APIs
                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 049CE50A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 963392458-0
                                                                                    • Opcode ID: 8aa1573b9d3d041deb735417e9641c84f557e0fa324266893403100d779081a2
                                                                                    • Instruction ID: 5ed80c9ec24e71a9224821dbf4abd216a94d851ff156b19545fd50a4fff51a3d
                                                                                    • Opcode Fuzzy Hash: 8aa1573b9d3d041deb735417e9641c84f557e0fa324266893403100d779081a2
                                                                                    • Instruction Fuzzy Hash: 7B8136B1D002499FDF10CFA9C8857ADBBF6BF48314F148529E85AE7244E774A881CF82
                                                                                    APIs
                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 049CE50A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 963392458-0
                                                                                    • Opcode ID: b03ed22fe522493ef3b3edb387fb9895c404e50a10173946d140dee4fb51d7a4
                                                                                    • Instruction ID: 98d8b45459a480a28ce3c4ca3319d6b6269e86fbf4b0a68b90a78123e016bde9
                                                                                    • Opcode Fuzzy Hash: b03ed22fe522493ef3b3edb387fb9895c404e50a10173946d140dee4fb51d7a4
                                                                                    • Instruction Fuzzy Hash: 078126B1D002599FDF10DFA9C8857ADBBF6BF48314F148529E85AE7244E774A881CF82
                                                                                    APIs
                                                                                    • CopyFileA.KERNEL32(?,?,?), ref: 049C3F6D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: CopyFile
                                                                                    • String ID:
                                                                                    • API String ID: 1304948518-0
                                                                                    • Opcode ID: a0573dd883bd4db284450f99343fd488b55198e966e8a396e5358bbb695f88c0
                                                                                    • Instruction ID: 1348ebe7ee96af1f088c6717035e229a0207a7911123c81be9a1be8f7368f878
                                                                                    • Opcode Fuzzy Hash: a0573dd883bd4db284450f99343fd488b55198e966e8a396e5358bbb695f88c0
                                                                                    • Instruction Fuzzy Hash: 4F517AB1D006199FEB20DFA9C8457EEBBF6BF48310F148529EC45E7284D774A881CB92
                                                                                    APIs
                                                                                    • CopyFileA.KERNEL32(?,?,?), ref: 049C3F6D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: CopyFile
                                                                                    • String ID:
                                                                                    • API String ID: 1304948518-0
                                                                                    • Opcode ID: 09248a1dcbe2ba3c7062dd050f598d1b26204dca48f24a1b674a55faa329dd32
                                                                                    • Instruction ID: 1744331558f6fda51555f05141c3400b6bf4b7b82ab37ffb362a7c1784d05303
                                                                                    • Opcode Fuzzy Hash: 09248a1dcbe2ba3c7062dd050f598d1b26204dca48f24a1b674a55faa329dd32
                                                                                    • Instruction Fuzzy Hash: 5A516CB1D007599FEB20DFA9C8457AEBBF6BF48310F148529EC55E7284D774A841CB82
                                                                                    APIs
                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 049CF430
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3559483778-0
                                                                                    • Opcode ID: 89051d9b37805e43284dfb13ad95b530f2eb82725c038d3990fd59056b47effd
                                                                                    • Instruction ID: fc2ee6d8330a55540301c04c62fdf9ccafb95193f1142cdb1996fc453ddbe4f3
                                                                                    • Opcode Fuzzy Hash: 89051d9b37805e43284dfb13ad95b530f2eb82725c038d3990fd59056b47effd
                                                                                    • Instruction Fuzzy Hash: 442155B5D003499FCB10DFAAC885BDEBBF5FF48310F10842AE958A7250D778A944CBA5
                                                                                    APIs
                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 049CF430
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3559483778-0
                                                                                    • Opcode ID: 51c53b372fc1fa22d8cf2a5390d580f31c49f272ad01e84dac4b14d8aa6a54c2
                                                                                    • Instruction ID: e58f462537297dd729f9b962863d70cb47e7b23b85e13345cd61ef8dfdf5038d
                                                                                    • Opcode Fuzzy Hash: 51c53b372fc1fa22d8cf2a5390d580f31c49f272ad01e84dac4b14d8aa6a54c2
                                                                                    • Instruction Fuzzy Hash: A42136B59003599FCB10DFA9C885BDEBBF5FF48310F10842AE958A7254C778A944CFA5
                                                                                    APIs
                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 049CEB7E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContextThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 983334009-0
                                                                                    • Opcode ID: 2fd409ca8816fd1a9a87016b0d1a0418816894cd1f627526f2a61cb0da8d272f
                                                                                    • Instruction ID: a4766834b08c7de89c768606c341f82fdd951c6635f72ebf0a567c4f4b272982
                                                                                    • Opcode Fuzzy Hash: 2fd409ca8816fd1a9a87016b0d1a0418816894cd1f627526f2a61cb0da8d272f
                                                                                    • Instruction Fuzzy Hash: 7D2139B1D003098FDB20DFAAC4857EEBBF5EF48324F108429D459A7240DB78A945CFA5
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0277CDE7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867535321.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_2770000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: a5955c4e217f7af8225e56af8f65577e500c109fb47b87fb1210ac7ac2a9942c
                                                                                    • Instruction ID: e692aa852a641bf8203bffd75582367233371d2fd1c9df5d058cccc1112727cb
                                                                                    • Opcode Fuzzy Hash: a5955c4e217f7af8225e56af8f65577e500c109fb47b87fb1210ac7ac2a9942c
                                                                                    • Instruction Fuzzy Hash: 8F21F2B59003599FDB10CFAAD984ADEBFF4FB48320F14846AE958A7250D374A941CFA1
                                                                                    APIs
                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 049CEB7E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContextThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 983334009-0
                                                                                    • Opcode ID: 1ce5550accd2c6781f8af0625d3078893b6aadbddd63d39d6ec5505067143037
                                                                                    • Instruction ID: a3bbe4a9ad966c16bcb4ccf64c46018a265a7d5760b657f6c5ead48d48f66f33
                                                                                    • Opcode Fuzzy Hash: 1ce5550accd2c6781f8af0625d3078893b6aadbddd63d39d6ec5505067143037
                                                                                    • Instruction Fuzzy Hash: B82118B19003098FDB10DFAAC4857EEBBF4EF48324F14842DD459A7241D778A945CFA5
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0277CDE7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867535321.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_2770000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: ad93e18aa5a332d3c286d1aa099c38b637394d058efe7f44b6fd47952cb9c918
                                                                                    • Instruction ID: c3af71efa08e8f2ce8640330b0572790e1c3c75dd8120979663f8af7ec7bfd1e
                                                                                    • Opcode Fuzzy Hash: ad93e18aa5a332d3c286d1aa099c38b637394d058efe7f44b6fd47952cb9c918
                                                                                    • Instruction Fuzzy Hash: 4721E2B59002099FDB10CFAAD984ADEBFF9FB48320F14841AE958A7310D374A940CFA5
                                                                                    APIs
                                                                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0636DCB4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899444834.0000000006360000.00000040.00000800.00020000.00000000.sdmp, Offset: 06360000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6360000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: ProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 544645111-0
                                                                                    • Opcode ID: 5e9c27a9bf4daf10c993bcb359b116dc68594de091afc7822f74fd109209eb80
                                                                                    • Instruction ID: e9b82a3a9de57546f439ce388778506620be2c5e35b9b98c74009d9fa3fe736a
                                                                                    • Opcode Fuzzy Hash: 5e9c27a9bf4daf10c993bcb359b116dc68594de091afc7822f74fd109209eb80
                                                                                    • Instruction Fuzzy Hash: 7E1106B5D002499FCB20DFAAC844ADEFBF5FF88320F10842AE559A7254C775A944CFA5
                                                                                    APIs
                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 049CF16E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 470efe8b69d618aca69c792f00bb64ad5ce997e0cdf825251820bbd21286d6b4
                                                                                    • Instruction ID: ee29e006f80ec687ff5c724e493001436b9230aa900c6d91ced6ccee77306fad
                                                                                    • Opcode Fuzzy Hash: 470efe8b69d618aca69c792f00bb64ad5ce997e0cdf825251820bbd21286d6b4
                                                                                    • Instruction Fuzzy Hash: E91189B19002489FCB20DFAAC844BDFBFF5EF48324F208419E459A7250C7359944CF91
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: Sleep
                                                                                    • String ID:
                                                                                    • API String ID: 3472027048-0
                                                                                    • Opcode ID: 937eeecaa6445b630fd3b7bf4117a7724871adfa1ef71f2bfb40e36854af227e
                                                                                    • Instruction ID: ef503be0f9bc75b383d0dc390ffeea69a8bab001017828caeba8553a6e6f1842
                                                                                    • Opcode Fuzzy Hash: 937eeecaa6445b630fd3b7bf4117a7724871adfa1ef71f2bfb40e36854af227e
                                                                                    • Instruction Fuzzy Hash: 78114CB19003598FDB20DFAAC4447EFFFF9AB88324F24842AD455A7250C735A944CBA5
                                                                                    APIs
                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 049CF16E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 46d42ae6464019be61fcf7e2429097a865d3528fbae4b71d6078981c9fd832e3
                                                                                    • Instruction ID: 5da6e64292208d2f42a962eb2aa30281869f5f1bb8fe3f912eaf9562f2019756
                                                                                    • Opcode Fuzzy Hash: 46d42ae6464019be61fcf7e2429097a865d3528fbae4b71d6078981c9fd832e3
                                                                                    • Instruction Fuzzy Hash: 0B1156B19002499FCB20DFAAC844ADEBBF5EB88320F208429E559A7250C735A940CFA1
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: Sleep
                                                                                    • String ID:
                                                                                    • API String ID: 3472027048-0
                                                                                    • Opcode ID: e9e02e873144937e3fda0b4f959bb1a30bc02302377c82cd6e3eb1ca18eddc42
                                                                                    • Instruction ID: c7416a897c3cc2ec109ea07f5a80ad2892c1c66bf2a1f1f5ef1e533e58fa044d
                                                                                    • Opcode Fuzzy Hash: e9e02e873144937e3fda0b4f959bb1a30bc02302377c82cd6e3eb1ca18eddc42
                                                                                    • Instruction Fuzzy Hash: 8D1179B5D003598FDB20DFAAC4447EEFBF4AF88324F24842AD455A7250C739A944CFA5
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 02778FFD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867535321.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_2770000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: 59aca7bf7aa25238f4527aa6fbbd2e00dc4c17ffe5fc55860b58784574da716e
                                                                                    • Instruction ID: 903a83245f6e1d29e2e3d249c400d262821ec77bdaede725edfebec7f09767fa
                                                                                    • Opcode Fuzzy Hash: 59aca7bf7aa25238f4527aa6fbbd2e00dc4c17ffe5fc55860b58784574da716e
                                                                                    • Instruction Fuzzy Hash: DA1100B5804399CFCB21CF69D1087EEBFF4EB0A324F1484ADD598A7282C3395605CBA1
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0277A6DE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867535321.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_2770000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID:
                                                                                    • API String ID: 4139908857-0
                                                                                    • Opcode ID: 3f075d11f28b61377718e37d76b21072d5bb2a21b828676def379d785e88f2ef
                                                                                    • Instruction ID: 03a511bea51145b0a8facf47599f3b7a2a5e740cef5c99b3387421de19463642
                                                                                    • Opcode Fuzzy Hash: 3f075d11f28b61377718e37d76b21072d5bb2a21b828676def379d785e88f2ef
                                                                                    • Instruction Fuzzy Hash: 491110B5D003498FDB20DF9AC444ADEFBF4AB88324F10842AD868A7710C379A545CFA5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 4'^q
                                                                                    • API String ID: 0-1614139903
                                                                                    • Opcode ID: 3249a717d3c4eb005c8ca3a0d74d47e09fc606234afd2e84fa6bc43c6e47ab32
                                                                                    • Instruction ID: 31da363abe1934a7938c7738d14db77b8315770803518818f1cd1304be46bb59
                                                                                    • Opcode Fuzzy Hash: 3249a717d3c4eb005c8ca3a0d74d47e09fc606234afd2e84fa6bc43c6e47ab32
                                                                                    • Instruction Fuzzy Hash: DDA1EF74A10218DFDB04EFA4D59499DBBB2FF89300F558569E8066B365DF31EC82CB50
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (bq
                                                                                    • API String ID: 0-149360118
                                                                                    • Opcode ID: 6f1e5349eef1b7e028a38564b728a7b1cad1a22a6a9e94405b7c081c74c1af28
                                                                                    • Instruction ID: a3b59aa7185354b92c168fde9b75cdb1f93b4be44cd470735a218782dba037cd
                                                                                    • Opcode Fuzzy Hash: 6f1e5349eef1b7e028a38564b728a7b1cad1a22a6a9e94405b7c081c74c1af28
                                                                                    • Instruction Fuzzy Hash: 7B716734B106148FEB14EF68D0A4AADB7B2EF89304F508569E4069B3A4DF74BD42CB81
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: TJcq
                                                                                    • API String ID: 0-1911830065
                                                                                    • Opcode ID: 10baaec043b27c8dca9e17b7901cee456314cc2fdeb3560a6ff709d2f2d716b6
                                                                                    • Instruction ID: 0adbebb9b079a3714a6d3c3cae7cc90d95ae9ae9233ee57fe2a52baa172daa53
                                                                                    • Opcode Fuzzy Hash: 10baaec043b27c8dca9e17b7901cee456314cc2fdeb3560a6ff709d2f2d716b6
                                                                                    • Instruction Fuzzy Hash: D7711578E0520CDFDB05EFA9E45869EBBB2FB89300F209029E515A7398DB345E45CF91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: TJcq
                                                                                    • API String ID: 0-1911830065
                                                                                    • Opcode ID: e123fff762fbfadb539e8d2d1f31d551e51c922187628889fffd6c4a38219815
                                                                                    • Instruction ID: 634bf9c657a9c37228cb062f052435e37976c0a0a36058065f6c356f8995097c
                                                                                    • Opcode Fuzzy Hash: e123fff762fbfadb539e8d2d1f31d551e51c922187628889fffd6c4a38219815
                                                                                    • Instruction Fuzzy Hash: D1711574E0520CDFDB05EFA9E45869EBBB2FB88300F209029E515A7398DB345E45CF91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (bq
                                                                                    • API String ID: 0-149360118
                                                                                    • Opcode ID: c15d0aafe409cec2f6744f3e723d2da7c06e8c90553164b70ce1a61617864b4b
                                                                                    • Instruction ID: 719ef7c8b7fc3e45903451fddbaa43aac9b6efc628ee9a26d71ccc3d34f96da7
                                                                                    • Opcode Fuzzy Hash: c15d0aafe409cec2f6744f3e723d2da7c06e8c90553164b70ce1a61617864b4b
                                                                                    • Instruction Fuzzy Hash: 24418036714244AFDB069F69D814E597FB6FF89310B1580AAE205CB372CB36EC11DB51
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 4'^q
                                                                                    • API String ID: 0-1614139903
                                                                                    • Opcode ID: d5b534f2862aa32c87031eec7f9d4dc3fd595fa053a33980928e2c5dc886b1b1
                                                                                    • Instruction ID: 2e4d7f27fad969775239b2025db95b7ce2a0769f465ccde41d010f945d5f4f93
                                                                                    • Opcode Fuzzy Hash: d5b534f2862aa32c87031eec7f9d4dc3fd595fa053a33980928e2c5dc886b1b1
                                                                                    • Instruction Fuzzy Hash: 41416B30B506188FDB04FB64D4A4AAEB7BAAFC9700F104529E407AB394DF74AC46CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,bq
                                                                                    • API String ID: 0-2474004448
                                                                                    • Opcode ID: fb443ef48cb76684b1151193d75012da5121b2e61e6f168d5efcbf746ae0b890
                                                                                    • Instruction ID: 710ac414eba7704c34a1fea5ef3eb791955f49db384dd4d2d41c576d39e7e9b2
                                                                                    • Opcode Fuzzy Hash: fb443ef48cb76684b1151193d75012da5121b2e61e6f168d5efcbf746ae0b890
                                                                                    • Instruction Fuzzy Hash: 394177357001158FCB05EF79D894AAEBBF6EF89350B258069E906DB361CB31EC42CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 4'^q
                                                                                    • API String ID: 0-1614139903
                                                                                    • Opcode ID: ccd84db92e5c5c882a17fb58947433e22c9ec488f0188b174fb416b8df6b2fd3
                                                                                    • Instruction ID: 5198658e10fc49f5b0ec3e0f9806909b31a0c38cdf86719848037ffa4f102fc0
                                                                                    • Opcode Fuzzy Hash: ccd84db92e5c5c882a17fb58947433e22c9ec488f0188b174fb416b8df6b2fd3
                                                                                    • Instruction Fuzzy Hash: B3319335A00104DFDF059F64CA94AA97FB6FF88310F0544A9E606AB365DB35EC56CB90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 4'^q
                                                                                    • API String ID: 0-1614139903
                                                                                    • Opcode ID: 25a10e3915d7aa7e3cdbbf16729600ad6d9f74cf6ebeb81c044e2d483880a3bd
                                                                                    • Instruction ID: 5c7ea6c2a940020ef4ebcd2e6be5e6f020fe1e44aaf8166514958e70bf2159f6
                                                                                    • Opcode Fuzzy Hash: 25a10e3915d7aa7e3cdbbf16729600ad6d9f74cf6ebeb81c044e2d483880a3bd
                                                                                    • Instruction Fuzzy Hash: 1B2174357001049FDF099F65C9549997BB7FF8C310B1540A9E606AB365DB32EC52CB90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 4'^q
                                                                                    • API String ID: 0-1614139903
                                                                                    • Opcode ID: 1f998f7f9302abc7182b78bc295c82d4856025ace56d6bc344fc89a3f38f1cbc
                                                                                    • Instruction ID: 4c6b80aaaee4a493ae88f600c5dc735cb4e9d5961b237e2464150859bf2c64df
                                                                                    • Opcode Fuzzy Hash: 1f998f7f9302abc7182b78bc295c82d4856025ace56d6bc344fc89a3f38f1cbc
                                                                                    • Instruction Fuzzy Hash: CB218330B502589BDB19AB65D464ABEBBABAFC8700F10443DE407EB394CF74AC46C781
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: p<^q
                                                                                    • API String ID: 0-1680888324
                                                                                    • Opcode ID: 9363c6c28474e56046fdc149ace12ee758f00eb1c98da16b62647769a4d44e50
                                                                                    • Instruction ID: 0725fb1933db6d7f14d520877956f8f4d5d26482c4d67728321ab34878006e2d
                                                                                    • Opcode Fuzzy Hash: 9363c6c28474e56046fdc149ace12ee758f00eb1c98da16b62647769a4d44e50
                                                                                    • Instruction Fuzzy Hash: A8216F313041549FDB16CF6AC854AAABBEAFF89750B1540A5FD5ACB2A1CA31EC51CB20
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: p<^q
                                                                                    • API String ID: 0-1680888324
                                                                                    • Opcode ID: f00b5b92786ed46b06ee4d4ac60916710c893058f4340160a0afb3d1a58958d8
                                                                                    • Instruction ID: f0799b535a433becdc6851cc03764656833feda42956ac2c3b8d4f07ac79c829
                                                                                    • Opcode Fuzzy Hash: f00b5b92786ed46b06ee4d4ac60916710c893058f4340160a0afb3d1a58958d8
                                                                                    • Instruction Fuzzy Hash: DD216F713041549FDB16CF6AC840AAABBEAFF89350F0540A5FC5ACB3A1CA35EC51CB60
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,bq
                                                                                    • API String ID: 0-2474004448
                                                                                    • Opcode ID: ecaa40fbbd9dcc8a705af36b558a9cc94f7a5b8df2c3a1e5fa0419c4243bc21a
                                                                                    • Instruction ID: 0b64b6f032cf315f0c3bef4fe6b491e9db4cf42255c17861930e2c3b6e1c63d9
                                                                                    • Opcode Fuzzy Hash: ecaa40fbbd9dcc8a705af36b558a9cc94f7a5b8df2c3a1e5fa0419c4243bc21a
                                                                                    • Instruction Fuzzy Hash: C51188357001169FCB04DFA9C994AAEBBF6EF89301F248065E9029B3A1DB31EC41CB90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: !
                                                                                    • API String ID: 0-2657877971
                                                                                    • Opcode ID: be4da3b4de656a7ce94132cbdb2d28aa712f33f99e8f313792f066ba0c5dc291
                                                                                    • Instruction ID: 3ba604d5ffc0049b7cdaca3dc662f16fa187d48839f56833a255fcd3733c0b10
                                                                                    • Opcode Fuzzy Hash: be4da3b4de656a7ce94132cbdb2d28aa712f33f99e8f313792f066ba0c5dc291
                                                                                    • Instruction Fuzzy Hash: FB11B671D082589FEB44CFA5E8406EDBBF6BF8A310F0894AAD809673D1DB354D02CB51
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 0636F093
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899444834.0000000006360000.00000040.00000800.00020000.00000000.sdmp, Offset: 06360000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6360000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: b4851c87fd5312955afb4c6b8a42c37048bf3f301a27663eb93142f84285bb3f
                                                                                    • Instruction ID: 7b91261296e8dde7f3cd533a8bca2fa2b6c16df8815ba0ddbf17a9ea852a6486
                                                                                    • Opcode Fuzzy Hash: b4851c87fd5312955afb4c6b8a42c37048bf3f301a27663eb93142f84285bb3f
                                                                                    • Instruction Fuzzy Hash: 2F1137B59002498FCB20DFAAC844BDEFBF5EB88320F208819E459A7254C775A544CF94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0dadc90162d8a72c3bd546f143e48632ac4610c2432503f482c9bf762cbd3b05
                                                                                    • Instruction ID: 4b859981550abf00ba317a4f7f465a0324fc1029bef48fd3bd051992d6b54614
                                                                                    • Opcode Fuzzy Hash: 0dadc90162d8a72c3bd546f143e48632ac4610c2432503f482c9bf762cbd3b05
                                                                                    • Instruction Fuzzy Hash: 6B12F934B102198FDB14EF64C994A9DBBB2BF89304F5186A8E44AAB355DF30ED85CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d0f4db7c2bfa1f7f6ce0eb6d22b014000eb7a286915168e4093a218d89bd5baf
                                                                                    • Instruction ID: c5517bd9096a50845e31835b0af5648974096752d8cd29598053a898c44ee8c1
                                                                                    • Opcode Fuzzy Hash: d0f4db7c2bfa1f7f6ce0eb6d22b014000eb7a286915168e4093a218d89bd5baf
                                                                                    • Instruction Fuzzy Hash: 3E91AA35B012059FDB05CFA5D985AADBBF6FF88301F148469E812AB381CB35ED81CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fdf4c0975fedf7d7b9dd42a720ae50a1467860fd62489978696d1be82134e229
                                                                                    • Instruction ID: dbdcd68b0149ac409cfc288dc5f73969fdb2e92f966594e6ba1ca30985a00cf3
                                                                                    • Opcode Fuzzy Hash: fdf4c0975fedf7d7b9dd42a720ae50a1467860fd62489978696d1be82134e229
                                                                                    • Instruction Fuzzy Hash: 8CA1F874B002188FDB14DF64C994BA9BBB6BF89304F5085A8E44AAB395DF34ED85CF40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6dffcfa6d9ef01ad38cefc17218b4ceeddd62feeca19f3d7297bf7a6cfda1b6c
                                                                                    • Instruction ID: 8984a99bc53d9d572f92935ddc34fd82de07881990dac0448b6665c28620294b
                                                                                    • Opcode Fuzzy Hash: 6dffcfa6d9ef01ad38cefc17218b4ceeddd62feeca19f3d7297bf7a6cfda1b6c
                                                                                    • Instruction Fuzzy Hash: C6A16E70E01619CFEF21DFA5D491AEDBBB1FF48304F148125E812AB295DB38A986DF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0785204aa49202f8d641f7cd25f334c7d3b7a6afecad4f2952378e8f661935ad
                                                                                    • Instruction ID: e8a3e07dbb2754b3cb1b73eb555c8492e1fdad87244a08aa8220b27982374c3d
                                                                                    • Opcode Fuzzy Hash: 0785204aa49202f8d641f7cd25f334c7d3b7a6afecad4f2952378e8f661935ad
                                                                                    • Instruction Fuzzy Hash: 14812A34B10214DFDB08DF68D498AADBBB6BF89700F1440A9E5069B3A5DB30ED41CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 06d5cbe6580bc2ee15ea4e9490e46243a8f28d3361f67b9036b9810bcca582f6
                                                                                    • Instruction ID: 86299680676ac4c54230a84ec9b10f7d96d2f3c6189c1fe51cba28c551efefd8
                                                                                    • Opcode Fuzzy Hash: 06d5cbe6580bc2ee15ea4e9490e46243a8f28d3361f67b9036b9810bcca582f6
                                                                                    • Instruction Fuzzy Hash: AA811735A00618DFCB14DF69D58499EB7F9BF88350B1681A9E816DB360DB30FD41CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a8e4f31b209375ca654f0140aecadaaf0cee56868a05b4868bec63fb41f0ac58
                                                                                    • Instruction ID: 3668ba8d2d7f97e0a89ccd16410062b6aae5409594d19047d5b5830bd234579d
                                                                                    • Opcode Fuzzy Hash: a8e4f31b209375ca654f0140aecadaaf0cee56868a05b4868bec63fb41f0ac58
                                                                                    • Instruction Fuzzy Hash: 35611935B10214DFDB04DF68D894AADBBB6FF89710F1585A9E9069B3A5CB30EC41CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3c08c005af4f23acda54e902dee472c34bbcfd0f70012df04208535ed4b42846
                                                                                    • Instruction ID: 7158594b58987b6b0e01e8905f2118d1723be6a19fcc4968a3fc17b3975bdf23
                                                                                    • Opcode Fuzzy Hash: 3c08c005af4f23acda54e902dee472c34bbcfd0f70012df04208535ed4b42846
                                                                                    • Instruction Fuzzy Hash: 38517E3020024ADFDB11DF69C980FA9BBB5FF44318F058AA5E8158B3A5D774F995CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 47c99512d427090f558a7f4ca6275dd678f4d1545122ed2ae4e2b432e5de72cc
                                                                                    • Instruction ID: a09e16008c2b10b4dc4890c793eea5f27c68faff53d02c165e420aa0f167090d
                                                                                    • Opcode Fuzzy Hash: 47c99512d427090f558a7f4ca6275dd678f4d1545122ed2ae4e2b432e5de72cc
                                                                                    • Instruction Fuzzy Hash: 35516234B106099FDB05EF64E499AAE7B76FFC8701F008129F5029B3A4DF749986CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 01208926fbb8a8bc414e7d73524b7bc3c6b2006f2289e1c5ffbce5db57bff638
                                                                                    • Instruction ID: 0f0e27e93d895eece6dba46f79185b90545efd4c90255a56b5f09bfd1c9a7cea
                                                                                    • Opcode Fuzzy Hash: 01208926fbb8a8bc414e7d73524b7bc3c6b2006f2289e1c5ffbce5db57bff638
                                                                                    • Instruction Fuzzy Hash: DD416D303006059FE72AAF24C594B6A7BA3EFC9704F14856CE5578B695DB76FC82CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 55f0e8c652caf74074d2d065416fede5b9b8703179bc28722ac60572ed431fc5
                                                                                    • Instruction ID: e3ef4155ef9d7f9dbf702042103da3a6d08f9297cafeddb458bc3aedf85bbde8
                                                                                    • Opcode Fuzzy Hash: 55f0e8c652caf74074d2d065416fede5b9b8703179bc28722ac60572ed431fc5
                                                                                    • Instruction Fuzzy Hash: 1D31F5366101159FCB15DF98D988E99BBB6FF48320B0680B8E50A9F372DB31EC55DB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fcf60225fd313785deab0b213ab0b1acd5105b901012760eb7fca42318d64572
                                                                                    • Instruction ID: 2d4eaca93ef401fe189a1e043ca6459200044b9be065e0e6588d0c0aaf9de862
                                                                                    • Opcode Fuzzy Hash: fcf60225fd313785deab0b213ab0b1acd5105b901012760eb7fca42318d64572
                                                                                    • Instruction Fuzzy Hash: CA41AE31A00315CFEB14CFA5C885AAEBBB6FF88344F108539D946E7291EB34E945CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f548108db304c2be7bfffb1ff72dfa35f8d117d811731d584df643548c743453
                                                                                    • Instruction ID: fc5ced949408a0f0a3ba9fad342469ef10e1d4d036271f7fea136310502c09e0
                                                                                    • Opcode Fuzzy Hash: f548108db304c2be7bfffb1ff72dfa35f8d117d811731d584df643548c743453
                                                                                    • Instruction Fuzzy Hash: AC410834A112288FEB24DF24CD91F99B7B5FB49710F1001E5EA0AAB3D1C671AD81CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 45b5c420f0c035dfca7990e2a34a2e43319c297155a944c29a8a57a53bc00b33
                                                                                    • Instruction ID: 6d5a3e27c4a38ef1c442db64e0caa160b3a8bd0142b43996f429ab4b0a029503
                                                                                    • Opcode Fuzzy Hash: 45b5c420f0c035dfca7990e2a34a2e43319c297155a944c29a8a57a53bc00b33
                                                                                    • Instruction Fuzzy Hash: 35316131600205AFDF15CF25D885FAA7BAAFF44364F068169F806CB2A5CB75E885CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9d05a6a8aba3976d5397e9099fd83bbc12203e5b27c80e90245ed4c5938f474b
                                                                                    • Instruction ID: 160685f937f62bb0d445f60f63a00a49680d0608fd484f046f3eb0059095e2a3
                                                                                    • Opcode Fuzzy Hash: 9d05a6a8aba3976d5397e9099fd83bbc12203e5b27c80e90245ed4c5938f474b
                                                                                    • Instruction Fuzzy Hash: A5311935A402189BDF04DFA4D854AEEB7B6FF88310F108079E902BB394DB31AD55CBA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 02c325097f7853162c4859d810730890bbce73147b0c33e36112ebeb3457c3d1
                                                                                    • Instruction ID: dba06cd461f2a10a8f4375a317f3e8f98fc1e69f981f75ebd3e52a5036ecdd12
                                                                                    • Opcode Fuzzy Hash: 02c325097f7853162c4859d810730890bbce73147b0c33e36112ebeb3457c3d1
                                                                                    • Instruction Fuzzy Hash: 02316D34700205CFD725AF35D485A2ABBB6FF85315B1444BCE8169B3A1DF35E886CB60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a4717b75426c3a188d3431d0b437bb4b212d72bf67eda20c5668ac42a2f3ce03
                                                                                    • Instruction ID: 6a5c0575a661fa63a41dc114c0818b4d14f9fe6cb8076fccf9a9c33eeb7d4674
                                                                                    • Opcode Fuzzy Hash: a4717b75426c3a188d3431d0b437bb4b212d72bf67eda20c5668ac42a2f3ce03
                                                                                    • Instruction Fuzzy Hash: B621F5723442005FDB248B6DE880666BBEDEBC1350F19857AE14EC7255CB35FC42C750
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a4af437338fef8352537859daeff3bd8148ba4900ab99404e5e6536c8e1cbcb2
                                                                                    • Instruction ID: 030a34108905594c3f543cead670863dcb196b9fb0248b6b485c5b9fdd6e9580
                                                                                    • Opcode Fuzzy Hash: a4af437338fef8352537859daeff3bd8148ba4900ab99404e5e6536c8e1cbcb2
                                                                                    • Instruction Fuzzy Hash: AA317C70D04208DFE746DFA9E4897EEBBF2FF49301F2494A5D505A7298DB744A80CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 89d7a3d25e3ce1ce9a19989c07a3d1018c7db4ccb161a20ebc1aadbb6c57497b
                                                                                    • Instruction ID: 8bfc01c2b41f54e6a27bf8db27ba44231aab71c1b4aa6ba47c01a55655dd14c2
                                                                                    • Opcode Fuzzy Hash: 89d7a3d25e3ce1ce9a19989c07a3d1018c7db4ccb161a20ebc1aadbb6c57497b
                                                                                    • Instruction Fuzzy Hash: FA217474B106098FCB04FFA8D5949AEFBB5FFC9700B10452AD506A7364EF70AA46CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 15a1b6b8bb1ca8edb2733f4674b11d51d2c9879031e8aec5297d02f2026a75e3
                                                                                    • Instruction ID: 9c6feabe8c1181ee99be7ece8545e9c363944db9a39b1ab8e4b7a491df752e36
                                                                                    • Opcode Fuzzy Hash: 15a1b6b8bb1ca8edb2733f4674b11d51d2c9879031e8aec5297d02f2026a75e3
                                                                                    • Instruction Fuzzy Hash: D3317F70D04208DFE746DFA9E4487AEBBF2FF49301F2498B5D505A7298D7745A80CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c9b95a90f43dcdc06b2d0381674186ea4df1a89a76cd41482c7a065d36954468
                                                                                    • Instruction ID: c107e21261ea69c612b9dd0259123af6c0339525f70f9f11d1d6c2b671af477f
                                                                                    • Opcode Fuzzy Hash: c9b95a90f43dcdc06b2d0381674186ea4df1a89a76cd41482c7a065d36954468
                                                                                    • Instruction Fuzzy Hash: 15216A31E00209DFDB50EFB8D904BAEBBF9AB44340F1084B6D51ADB290E774EA41DB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867011021.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_eed000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 80d6a35f0f1e619f5d507cf257a5a3fdffbb4bfc512e4f8eb8ac071232e88260
                                                                                    • Instruction ID: a49749d4edbd04d53828bafc853e4737a285ae6ff6c7fc747d55b286ac4fb746
                                                                                    • Opcode Fuzzy Hash: 80d6a35f0f1e619f5d507cf257a5a3fdffbb4bfc512e4f8eb8ac071232e88260
                                                                                    • Instruction Fuzzy Hash: 2A214871508288DFDB01DF04DDC0B27BF65FB94328F20C569D9091B256C336D859CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 766b13cd3a943bc65c4c8cc474dd095671891d7e6ec02a28eaf887a969916f62
                                                                                    • Instruction ID: 355886e538e3f096452710b07eefc9908d4b259051b18db8cf5cf3cc66f9dcd4
                                                                                    • Opcode Fuzzy Hash: 766b13cd3a943bc65c4c8cc474dd095671891d7e6ec02a28eaf887a969916f62
                                                                                    • Instruction Fuzzy Hash: B931F574E05209CFEB44DFA9E8457EEBBF2FB88300F149469D516B3284DB781A458B91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a3f4db09243ac477775d789e8dfa34f1942bb5c0c26cab6997294cd9a0549f9d
                                                                                    • Instruction ID: 4f054ea6dcd0a5b7f767adeb8959b793df4ac1d067f8911ebd35ae34a172aa22
                                                                                    • Opcode Fuzzy Hash: a3f4db09243ac477775d789e8dfa34f1942bb5c0c26cab6997294cd9a0549f9d
                                                                                    • Instruction Fuzzy Hash: 8821E674E04209DFEB44DFAAD8447EEBBF6FB88300F14A429D516B3384DB785A458B91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867084459.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_efd000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ee244deb66670e5acb64693a123d5712fe0250c9294d41bca3cd5d31159aa664
                                                                                    • Instruction ID: 4e6481cc68d4f644d5caffd2a25ea6123e848192c720f2b525f9be2e3997a6bc
                                                                                    • Opcode Fuzzy Hash: ee244deb66670e5acb64693a123d5712fe0250c9294d41bca3cd5d31159aa664
                                                                                    • Instruction Fuzzy Hash: 9A210771509248DFDB05DF14DDC0B36BFA6FB84318F24C569EA095B255C336D81AC7A2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867084459.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_efd000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4f1b8747bf257b3e8b29528544d4d6c108ec67f585281537183c16e22e20d27e
                                                                                    • Instruction ID: 169401fd2124d654812b09c9a7733b898cb4839194dca63ee4a43c18a8d66019
                                                                                    • Opcode Fuzzy Hash: 4f1b8747bf257b3e8b29528544d4d6c108ec67f585281537183c16e22e20d27e
                                                                                    • Instruction Fuzzy Hash: E221F571608208DFDB15DF14D984B26BF67EB84318F20C569DA095B296CB36D847CA61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 72c6183403ba58b12eb4a520055a5fd090548e49138c349e70e05446aa69a7a4
                                                                                    • Instruction ID: 4efef7d3f006233dd15ce4b5161343ff138c585d9225164bc30969917d020ccc
                                                                                    • Opcode Fuzzy Hash: 72c6183403ba58b12eb4a520055a5fd090548e49138c349e70e05446aa69a7a4
                                                                                    • Instruction Fuzzy Hash: 6021AE71A00305CFDB00DF68C884AAEBBF6FF88354F008539D94AA7350EB31A945CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ac40e86d7a3230aa6cdc567cb9b827b28e238f1dc85e94f77292a2acf5457ee8
                                                                                    • Instruction ID: 69229405899d316ed3d97da89235597cd1848e4bfe114dcfcaa8b96310662d82
                                                                                    • Opcode Fuzzy Hash: ac40e86d7a3230aa6cdc567cb9b827b28e238f1dc85e94f77292a2acf5457ee8
                                                                                    • Instruction Fuzzy Hash: 2F210876A10114DFCB05CFA8E988E99BBB2FF49320B1644B9F6099B272D731EC15DB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 83880c58c0de5b11c8ffbc010a95d635cd35be03c7ca2e8e885d67fcf6e00eb8
                                                                                    • Instruction ID: 0debf8eae7da580d7082ff937c22fb1674052117b556a5430d254fe033b4a47c
                                                                                    • Opcode Fuzzy Hash: 83880c58c0de5b11c8ffbc010a95d635cd35be03c7ca2e8e885d67fcf6e00eb8
                                                                                    • Instruction Fuzzy Hash: B621C974B00609CFDB00EF68D4809AEFBB5FF89704F104569D506A7364EB74AA46CF91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f436a85e3000636dd674db44f29cda8ecf465f8051ad758416f79fc06a848b3a
                                                                                    • Instruction ID: 682a569714ce6c54ec3dd16fdc5924b871216b5f2122887a12f209954f352abd
                                                                                    • Opcode Fuzzy Hash: f436a85e3000636dd674db44f29cda8ecf465f8051ad758416f79fc06a848b3a
                                                                                    • Instruction Fuzzy Hash: DA21E631A002198FDB04DF98D685ADDB7F2FF88305F1045A5E405AB3A1DB76AD85CBA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 205827ffc643b8eaf5a3d18278377cd674a49db52a074b38591db31b8cf6b110
                                                                                    • Instruction ID: b784a4556c0e721a899298a148f3f9b0ed8de970ddf89036b7caf2a5268b65b1
                                                                                    • Opcode Fuzzy Hash: 205827ffc643b8eaf5a3d18278377cd674a49db52a074b38591db31b8cf6b110
                                                                                    • Instruction Fuzzy Hash: 59215975D05219CFEB04EFE9D4042EEBBF6FB98300F10A429D409B3284DB741A45CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dc9a945ae57b2584227e1af57a257ca47a2971776d12647146c5ec20929f8af4
                                                                                    • Instruction ID: deb9056b014a085a980ed03ce7fdbb7efe3cf963a2e0728bd159c96d4f1133d2
                                                                                    • Opcode Fuzzy Hash: dc9a945ae57b2584227e1af57a257ca47a2971776d12647146c5ec20929f8af4
                                                                                    • Instruction Fuzzy Hash: F6219734B106049FCB14EF28D994AAEBBB6EFC9300F144679E5069B360DB30AD45CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1693a3652eb6c41cdd9d92549fb87669d745a90d9cb496336be7731d608fa135
                                                                                    • Instruction ID: 8c2f9cce77bbea64c7a07c308a7ef7cb72a6fa9cee3dae04bb835f46f23b4b24
                                                                                    • Opcode Fuzzy Hash: 1693a3652eb6c41cdd9d92549fb87669d745a90d9cb496336be7731d608fa135
                                                                                    • Instruction Fuzzy Hash: ED210A35A00209CFDB04DFA4D695A9DB7F2FF88304F1045A5D401AB3A1DB75AD85CBA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d46d9fe994d8bd3fa221e45fd2f3b8b705c028a5e3e93015adc55b49c8074a0a
                                                                                    • Instruction ID: 87f4e8288885728e26b4063909286e3fbe24ffba7389b3393bb4e6a08b7f6fc3
                                                                                    • Opcode Fuzzy Hash: d46d9fe994d8bd3fa221e45fd2f3b8b705c028a5e3e93015adc55b49c8074a0a
                                                                                    • Instruction Fuzzy Hash: 1521D2307102056FDB14EB69D9467AEBBF6EB84300F508538E01AD7695DFB49D8987D0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867084459.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_efd000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1d4c088326bf84373886ad838ddbc1ba801e8e23a366f47966b84a159fb67a8a
                                                                                    • Instruction ID: 6269ca2f4764406775760614749a417b66dd7edc4fb4673d127add9a58934421
                                                                                    • Opcode Fuzzy Hash: 1d4c088326bf84373886ad838ddbc1ba801e8e23a366f47966b84a159fb67a8a
                                                                                    • Instruction Fuzzy Hash: 4A21837550D3848FD702CF24D994715BF72EB46314F28C5EAD9498F2A7C33A980ACB62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1e0b4e064ec6c98ec6666244435501254b0fa1de6707c2b20b613e0790fc1008
                                                                                    • Instruction ID: 98f76395418bc1e34ae8c8b815c8ee05f098b2f1642109b91b131cfda01f38a8
                                                                                    • Opcode Fuzzy Hash: 1e0b4e064ec6c98ec6666244435501254b0fa1de6707c2b20b613e0790fc1008
                                                                                    • Instruction Fuzzy Hash: A6214770D042098FDB44CFAAE4856EEBBF6FF88311F04942AD905B3250D7345A45CB94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6bb4508a0126555ae7c751e3baec13ac22870e5e22333b8956c55d7b65eee3fa
                                                                                    • Instruction ID: 47c38ad263f0db0f4341fe94b83c27a5f96cd3dce9a01d99d2f72af10354e07c
                                                                                    • Opcode Fuzzy Hash: 6bb4508a0126555ae7c751e3baec13ac22870e5e22333b8956c55d7b65eee3fa
                                                                                    • Instruction Fuzzy Hash: F5114334B106088FCB14EF68D994AAEB7F6EFC8710F144679E5069B360DB30AD45CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 91415532b6507c93b2f37622858b36ff8b0906bdc96018087e217c1e43ef8f39
                                                                                    • Instruction ID: b55be92c7966a8dc8f4d781e1f7a7d2d5b75d37c91f762013a96c995d3c3495f
                                                                                    • Opcode Fuzzy Hash: 91415532b6507c93b2f37622858b36ff8b0906bdc96018087e217c1e43ef8f39
                                                                                    • Instruction Fuzzy Hash: 66112370D0421ACBDB44CF9AE4856EEBBF6FF88311F10D42AE905B3290DB345A45CBA4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ad921aa5cc70224ef5d147800994526a18414306116db9368a664d82e2fb4ac4
                                                                                    • Instruction ID: bab02c3e69cfd2527fe333060e231282f1954cd3b8c7229f0e1bcd62b5c02c7e
                                                                                    • Opcode Fuzzy Hash: ad921aa5cc70224ef5d147800994526a18414306116db9368a664d82e2fb4ac4
                                                                                    • Instruction Fuzzy Hash: 411121B2A00118ABDB15DF99D880DDEBBFCFF89360F058166E505E7250E671A905CBA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867011021.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_eed000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                    • Instruction ID: c0ffaf3e39b180972f4d568e18a0ed3d8e477631eb0147ea59086900eebb5428
                                                                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                    • Instruction Fuzzy Hash: 4C11D376508284CFDB16CF14D9C4B16BF71FB94328F24C5A9D9090B256C336D85ACBA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867084459.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_efd000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8904e6e2034f6e8b723f427b0fac37b038faba2da46a35eb3e2bfe2bad4ef527
                                                                                    • Instruction ID: 5f0b341a8d8381d76cc5deb9f149a7129836d9ed84c5a2a540a2278f7881817b
                                                                                    • Opcode Fuzzy Hash: 8904e6e2034f6e8b723f427b0fac37b038faba2da46a35eb3e2bfe2bad4ef527
                                                                                    • Instruction Fuzzy Hash: A7110876509284CFDB05DF10D9C4B26BF72FB84318F24C2A9DD491B656C336D91ACBA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899750353.00000000065B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65b0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 977ce0371d2c872d7f6f725d6323eb2941059db21e806706006721edc5a9f2c9
                                                                                    • Instruction ID: 4574c35049ac063d129ad06189a737ef28989aa3e86d44c8d2eba4033915fd37
                                                                                    • Opcode Fuzzy Hash: 977ce0371d2c872d7f6f725d6323eb2941059db21e806706006721edc5a9f2c9
                                                                                    • Instruction Fuzzy Hash: 7711C235B10216AFDFA49FA98845BAE7BF2BF88710F04442AF515D7380DB31C941CBA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b4a497e138e197fa52a49c4a30c58407deb3f9ba266c7c75ed69c8f52aa45763
                                                                                    • Instruction ID: 36fc96c9af31fb51a7262bd06f992aa545842f997fc7f3539673c9dd02cb97e3
                                                                                    • Opcode Fuzzy Hash: b4a497e138e197fa52a49c4a30c58407deb3f9ba266c7c75ed69c8f52aa45763
                                                                                    • Instruction Fuzzy Hash: 0301B5326042585FDB54DEA9D084BEEBFECEB55360F24C4BBE484CB250D631E990C750
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e9ed4f6fc1ab07a5f73c1fb49529c5c3f5c496d3e1e91ed3d6edbcedde046262
                                                                                    • Instruction ID: 33fb4cfc48c4c8e1ac21e50b02df83cf4313762adbaab45e8bed1151f80911c3
                                                                                    • Opcode Fuzzy Hash: e9ed4f6fc1ab07a5f73c1fb49529c5c3f5c496d3e1e91ed3d6edbcedde046262
                                                                                    • Instruction Fuzzy Hash: 0B01C0347002049FDB299B34C050B3A7BA7EBC9314F044929E5568B290DB75F843C781
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899750353.00000000065B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65b0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 36178e36491114b74af5005a2eb5d28d53893168ad1945a3478e271f872f03a5
                                                                                    • Instruction ID: 8c73ca63086794b080fb3eaf0e6a7ad90247b4e5d4a826f7477c6c6819b951aa
                                                                                    • Opcode Fuzzy Hash: 36178e36491114b74af5005a2eb5d28d53893168ad1945a3478e271f872f03a5
                                                                                    • Instruction Fuzzy Hash: 5711B3B4E0020D9FDB48DFB9D9457AEBBF5BF88300F10896A9418B7354EB359A418B91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 90208f95be3281bc61b1d345ccd34ae1363f8f6df12cdaeab522a90c8ad2db16
                                                                                    • Instruction ID: ea03882c9eb3be6e680074355f724b65db835e152ad942a6e2e126dac38acd5a
                                                                                    • Opcode Fuzzy Hash: 90208f95be3281bc61b1d345ccd34ae1363f8f6df12cdaeab522a90c8ad2db16
                                                                                    • Instruction Fuzzy Hash: 6F014F35300614DFD709AB24D454A5EBBA6FBCD711F108569E90A8B790DF36EC83CB85
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c82dc814da96a96f554969207b4bac544f19715db586ebbdf9587efc4e2b9628
                                                                                    • Instruction ID: 06cf6a61bab1e678123fae3cab04cf67df79ea3da6ff394621f505e3b8482ceb
                                                                                    • Opcode Fuzzy Hash: c82dc814da96a96f554969207b4bac544f19715db586ebbdf9587efc4e2b9628
                                                                                    • Instruction Fuzzy Hash: 0E019A347007048FDB29AA24C054B2A77A7ABC9324F148A29E55B8B694EB75FC43DB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9a5ac70c2512bdc9fb21062437686afd3bd45dff60bc1ebc746773e08974ce74
                                                                                    • Instruction ID: 02c97a68dfadcfbe15f75e61bb0b456492a17f2ccc61b7f74e600dc5a2f51bd1
                                                                                    • Opcode Fuzzy Hash: 9a5ac70c2512bdc9fb21062437686afd3bd45dff60bc1ebc746773e08974ce74
                                                                                    • Instruction Fuzzy Hash: 0E015A70E0520CEFCB94EFA8E55479DBBF4EB49310F0099E9E809A3280DA369A41DB41
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 452d01bf35b115d7a249b93a56d3ed91138a7a73e17aafd34c6acbea7b2cac11
                                                                                    • Instruction ID: d6ce55dbc7758c7bc5dc489eb15917c87d6b5eb974e7d0acf0f0e49b9efa4483
                                                                                    • Opcode Fuzzy Hash: 452d01bf35b115d7a249b93a56d3ed91138a7a73e17aafd34c6acbea7b2cac11
                                                                                    • Instruction Fuzzy Hash: 6CF062313011109FC7049E2AD894B66F7DAFBC8754B2481B9E60ACB366DE35EC01C7E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8e606a3c253a822c2ab930759c40ea5651d40e8a8fcb3aeecbef4c6b66dedb81
                                                                                    • Instruction ID: abea479d356c92b2ecff1a40c14d053d004e8ccaf3d5d5b0375665c5f7c44046
                                                                                    • Opcode Fuzzy Hash: 8e606a3c253a822c2ab930759c40ea5651d40e8a8fcb3aeecbef4c6b66dedb81
                                                                                    • Instruction Fuzzy Hash: 75F0277130E1916BEB615B3928243AAAFA9EF87910F541CBDF981D3241D6054C0EC3A0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5a16af260fc45a2ede76070d1ce9670cd0788cdcfab5516766376163a447602e
                                                                                    • Instruction ID: eaab2f6b7bbe4daf9769097f14853dd838a01621492a2e3013de0480c9091442
                                                                                    • Opcode Fuzzy Hash: 5a16af260fc45a2ede76070d1ce9670cd0788cdcfab5516766376163a447602e
                                                                                    • Instruction Fuzzy Hash: 3EF0C236B102149BEB18EA38E4647DEBBA6EBC8314F10423EF51697384CF71AD46C790
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9559fd1bd3fce52fdf5c6a18bbc0ca43750b0c5b32d4675ec3ef88dd2d21bab8
                                                                                    • Instruction ID: cc619a51febff66d4e820fd68df5dd7b768ad9eff633a51b3daf85532fb2bd3b
                                                                                    • Opcode Fuzzy Hash: 9559fd1bd3fce52fdf5c6a18bbc0ca43750b0c5b32d4675ec3ef88dd2d21bab8
                                                                                    • Instruction Fuzzy Hash: A4018C353006149FD7099B28D05491FBBA2FBCC711B10812AE90A8B390DF36EC82CBC5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c2073ef8034af5b0e0c064df75770034f88447ac06dd38e72c2fcea389f9acaf
                                                                                    • Instruction ID: 1e5c7b19ea8367a0b561d6167c73908d27ead4c23c99d76ab9260fadf6d94e44
                                                                                    • Opcode Fuzzy Hash: c2073ef8034af5b0e0c064df75770034f88447ac06dd38e72c2fcea389f9acaf
                                                                                    • Instruction Fuzzy Hash: 93F024367100086BDB15AA2DD4589AEBBAAEF88320F04403AF955C7360DF309D1AC790
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 54ddf8b2a530756d3afd383e88c6352bd0235845b88599bc841f167f17d5aa40
                                                                                    • Instruction ID: 36960684c951408596dfdf703297d532a51e1493f626581b0e17c6b8d208eda5
                                                                                    • Opcode Fuzzy Hash: 54ddf8b2a530756d3afd383e88c6352bd0235845b88599bc841f167f17d5aa40
                                                                                    • Instruction Fuzzy Hash: 11F06D393102009FD7049B29D854E6A7BAAEFC9620F0440A9F9468B3A0CA31EC82CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 975ccdf23b2058741d90c5f6cc11828688c42c2ebb17ed2bdb9d2ba45b28577b
                                                                                    • Instruction ID: c83ed2bb273e36d3babc09d710057892f7d13d80a0050d52d97372779d30a05e
                                                                                    • Opcode Fuzzy Hash: 975ccdf23b2058741d90c5f6cc11828688c42c2ebb17ed2bdb9d2ba45b28577b
                                                                                    • Instruction Fuzzy Hash: 55F05C7170B1504FEF2566385D602B8A7A5DB87640B800C7ED543D7351EB05DC068351
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c9fb35587bec07759cef76776ad1be108055ebb298ec32b7eec5ada419d532bb
                                                                                    • Instruction ID: 23940d97eb6f526a61badddb14a068e3e406b2fae1e08bd28e28bdcc56ec200e
                                                                                    • Opcode Fuzzy Hash: c9fb35587bec07759cef76776ad1be108055ebb298ec32b7eec5ada419d532bb
                                                                                    • Instruction Fuzzy Hash: 08F02E722042005FD7119729EC45B97FF9ADBC1251B04C539E15687225CE30ED8EC790
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ca5790df1a9192dd9cd0bd39e459c113a9d158a44c3e5e490e06a0aff0c1cd7c
                                                                                    • Instruction ID: ec436a1c0588d9425e7ab57e2a0524ba2124ebfc7a6c7d05291b896d8d4df4ee
                                                                                    • Opcode Fuzzy Hash: ca5790df1a9192dd9cd0bd39e459c113a9d158a44c3e5e490e06a0aff0c1cd7c
                                                                                    • Instruction Fuzzy Hash: 4DF05E353502009FD704DB29D454D6A77AAEFC9721B11406DF9068B3A0CA31EC42CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 08fceb34454d7defbb8a2e1fb4dc408e61a19189a11661b6f4730e369d805a62
                                                                                    • Instruction ID: 8e9737c09ffc2fb48167917f104f2235de23d99be494b06a4bef78cabe672b11
                                                                                    • Opcode Fuzzy Hash: 08fceb34454d7defbb8a2e1fb4dc408e61a19189a11661b6f4730e369d805a62
                                                                                    • Instruction Fuzzy Hash: DAF0E231A04248AFEB05CBA4D8897DC7FF6EB48211F08C095E04682280CB301AC6CB84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 96c52e7a3a69f53d193f8e85b1681a249a52e8d90f861f1774953d1e7a3bb353
                                                                                    • Instruction ID: b12331c38d5745e6e8349a0d322dddba736d6466a6adaaa384c81fa54d57d969
                                                                                    • Opcode Fuzzy Hash: 96c52e7a3a69f53d193f8e85b1681a249a52e8d90f861f1774953d1e7a3bb353
                                                                                    • Instruction Fuzzy Hash: A2E0D8726082110FDB556A3CAD4039937E6CF84525F044735E4DAC7385EA1CDC474361
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6cbeb4b8cfc3876dc555314aa91b1d07c6151296607cd2e2ee69a48a2707e29a
                                                                                    • Instruction ID: 001213d66bd58e4af395a72cb277cfd55129f7b04c0bc57f68a9e27d435c3fdf
                                                                                    • Opcode Fuzzy Hash: 6cbeb4b8cfc3876dc555314aa91b1d07c6151296607cd2e2ee69a48a2707e29a
                                                                                    • Instruction Fuzzy Hash: 89E0D832F046582FEB04A7BA6411BDEBBEACBC5654F04817EE54DD7281ECB539028794
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a947177376abd823af065452291c7d35f9e3b63fe64739e1693651ee0c6facf0
                                                                                    • Instruction ID: 62dd58b65ce2c3288fc5a09160a6dc5b5ea0f5cea6d9493d7d7ed35abc2669b2
                                                                                    • Opcode Fuzzy Hash: a947177376abd823af065452291c7d35f9e3b63fe64739e1693651ee0c6facf0
                                                                                    • Instruction Fuzzy Hash: 9FE08632F002282BEB14A69A9411B9FB7DACBC4764F00807AD50ED7380EDB5790147D4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fb5362ff822826245613bd4a87f26235f6802b238ac72108fde1cc475b8819fd
                                                                                    • Instruction ID: 7d1ae0dbbad7a2968466a538010764f1c5bafe724cb7a6b8e9277861da101073
                                                                                    • Opcode Fuzzy Hash: fb5362ff822826245613bd4a87f26235f6802b238ac72108fde1cc475b8819fd
                                                                                    • Instruction Fuzzy Hash: 3FF06535A14218AFDB09CF98D4896DDBFFAEB44311F14C0A5E00693280DB741AC1CB84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: beb788aeb7bc869945421d3e0ed2caa56e2811910e70bc00916538e20ac3ad62
                                                                                    • Instruction ID: 74a9e0d6fc7f53a1d9f448677f4a3a790ee041f02f881ae45242a5fc8db5388b
                                                                                    • Opcode Fuzzy Hash: beb788aeb7bc869945421d3e0ed2caa56e2811910e70bc00916538e20ac3ad62
                                                                                    • Instruction Fuzzy Hash: CAF08234944208AFCB90CFA8D840AEDBBF1FF49330F10D699E865572E1D7314A52EB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 702d347be8addda891f62cfd087bca20f0f17143651bed6c64cd77df9bfdb92d
                                                                                    • Instruction ID: 2ead427c4dda433512cbbfdf042c81dfab9dfcf6724a374461eb44b9a0c1ee08
                                                                                    • Opcode Fuzzy Hash: 702d347be8addda891f62cfd087bca20f0f17143651bed6c64cd77df9bfdb92d
                                                                                    • Instruction Fuzzy Hash: B3E048313402055FC7119A1AED84D4BFF9AEFC0765714C539E11A87325DE70ED8987D0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 74b092bf9b0eba1eaa91b5bdc513908648b01f3a21f3ad76d5c905e1b0561da5
                                                                                    • Instruction ID: 03b83222e561331a12853a81dcd77f0e62e26481f397bdd36a24903baf3d71d6
                                                                                    • Opcode Fuzzy Hash: 74b092bf9b0eba1eaa91b5bdc513908648b01f3a21f3ad76d5c905e1b0561da5
                                                                                    • Instruction Fuzzy Hash: D6E0CD30340314ABDB1877754D11B71329D5F45794F2048B5D60BAF2D4DB72FC4183A1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899895501.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65d0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d4ae59c99cc7ceb22e26cf0cf8c9106c85ef9e20922355738c815b974a52dcb9
                                                                                    • Instruction ID: 328e45f41c238ba0624ea1676a73243b50a7faaa9794925435a84fe6cba10c89
                                                                                    • Opcode Fuzzy Hash: d4ae59c99cc7ceb22e26cf0cf8c9106c85ef9e20922355738c815b974a52dcb9
                                                                                    • Instruction Fuzzy Hash: 82E0DF34A4C044EFE768DA58E1116797B64AB46344F1489DCDC084B2C2CA339C26C681
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899750353.00000000065B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65b0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 569750d3bece4d4d06f9de75aa845fcceeaa297f267291e92f8a047535dd6e14
                                                                                    • Instruction ID: 99147e539d2265b22681c6b4d1d290e8be5232bd6a5b0a6cfd442c1f008bc8a7
                                                                                    • Opcode Fuzzy Hash: 569750d3bece4d4d06f9de75aa845fcceeaa297f267291e92f8a047535dd6e14
                                                                                    • Instruction Fuzzy Hash: 67E0C974E04208EFCB84DFA8D94169DBBF4FB88310F10C5A99C4893350D7319A51DF80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899750353.00000000065B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65b0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 569750d3bece4d4d06f9de75aa845fcceeaa297f267291e92f8a047535dd6e14
                                                                                    • Instruction ID: 230fac712d8434aa7078dad31b8e5842d72e623ec8745a94959be2e98df9b23e
                                                                                    • Opcode Fuzzy Hash: 569750d3bece4d4d06f9de75aa845fcceeaa297f267291e92f8a047535dd6e14
                                                                                    • Instruction Fuzzy Hash: ACE0C974E0520CEFCB84DFA8D54469DBBF4FB48310F50C5A9985893340DB319A51DF80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899750353.00000000065B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65b0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 569750d3bece4d4d06f9de75aa845fcceeaa297f267291e92f8a047535dd6e14
                                                                                    • Instruction ID: 5fd6072b121fbb2fe31f3fb8890abd52103c98cce3c885cd2b3f1c67dd8e76fa
                                                                                    • Opcode Fuzzy Hash: 569750d3bece4d4d06f9de75aa845fcceeaa297f267291e92f8a047535dd6e14
                                                                                    • Instruction Fuzzy Hash: EAE0C974E44208EFCB84DFE8D544A9DBBF4FB48310F10C5A9980893340D771AA61DF80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bd5b04788fb66744189636d93dba24fb14af44c914090e16dadd9651e520fa47
                                                                                    • Instruction ID: e0fb20f874ccddecca8e2e9ea6e18561f35067c3998315ced7c2f622770ed1aa
                                                                                    • Opcode Fuzzy Hash: bd5b04788fb66744189636d93dba24fb14af44c914090e16dadd9651e520fa47
                                                                                    • Instruction Fuzzy Hash: 03F0A030A042489FC740CFA8D4106ACBFF0FB45314F1495CAD859872D2C7315A02DB00
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0d12f1f1bcb370d19275e7ddbcf51cd06cd15117d6be62b98b97e7b912f6dd51
                                                                                    • Instruction ID: b8ad2d5ba18383b6f1f0e40302574929ba60dfc65a8d2f1d30a98250e8cf312d
                                                                                    • Opcode Fuzzy Hash: 0d12f1f1bcb370d19275e7ddbcf51cd06cd15117d6be62b98b97e7b912f6dd51
                                                                                    • Instruction Fuzzy Hash: CDE02631508108DFD350DA94E8206DE7B78EB16300F449089980883382CA329D02C340
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 19caf7863fee4a9bcd59f63bbf7b13baea293956204efe677d6b7bfc51cff373
                                                                                    • Instruction ID: 5584874054c9ee676271ca1790fb0a0270d45eca0e76d753e303d401d207a4d1
                                                                                    • Opcode Fuzzy Hash: 19caf7863fee4a9bcd59f63bbf7b13baea293956204efe677d6b7bfc51cff373
                                                                                    • Instruction Fuzzy Hash: 62E09A72949208CFC752DFB8AA1429E7BB1FF06201F0018FAE405DB1A0EB354E04C7A2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899895501.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65d0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 86996f0517815bbe720ca56f2cf9caf2aebeed1fd807d18ee8bf59987e646333
                                                                                    • Instruction ID: 91cfd51edef76a8083440585ba3185e35e995c25111702df0bdd8e7c42f0dcd5
                                                                                    • Opcode Fuzzy Hash: 86996f0517815bbe720ca56f2cf9caf2aebeed1fd807d18ee8bf59987e646333
                                                                                    • Instruction Fuzzy Hash: 09E08634649004DFC364CE98D440BB87B61BB45314F24899CDC495B2C28B335D03CA80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899750353.00000000065B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65b0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bd7775d513468d57bb5cc7615efa1d67ed3c1551831cb565d662e2b4fc4e5bca
                                                                                    • Instruction ID: 1745197d43a5233ea0a457a3fa68f0ed809c86e899a04fab0b3450569746378f
                                                                                    • Opcode Fuzzy Hash: bd7775d513468d57bb5cc7615efa1d67ed3c1551831cb565d662e2b4fc4e5bca
                                                                                    • Instruction Fuzzy Hash: 52E04F74908108AFCB84DFD4E540AADBBB9BF45310F10C5A9A84457342C7319A51DB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 37a48fa5f82ff5cd1b4806d0642d17256a47d5f10d33cf1e8571712dffc5bbc9
                                                                                    • Instruction ID: e829d9a70b05bf4045a90044cf3a977cc32dfe7f1dad57d92d7bb3f6dd28134e
                                                                                    • Opcode Fuzzy Hash: 37a48fa5f82ff5cd1b4806d0642d17256a47d5f10d33cf1e8571712dffc5bbc9
                                                                                    • Instruction Fuzzy Hash: 54E0DF34A082449BDB45DB64E1507AD7BB0AB46214F18A8DCC8490B282CA321E03E640
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899750353.00000000065B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65b0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 21e2c35a7fc302e4355ac14f4ba1a90ec31b1439868ae4b421a85783eef32f19
                                                                                    • Instruction ID: b39575b401c8b546d58faa2b7f648fc310014ef41158bdcdf3e34fabe36144a8
                                                                                    • Opcode Fuzzy Hash: 21e2c35a7fc302e4355ac14f4ba1a90ec31b1439868ae4b421a85783eef32f19
                                                                                    • Instruction Fuzzy Hash: 96E01234D08208EFCB84DBE8D5416ACFBB4BB88310F1085AA985863381CA329A02DB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4b54a1d534956ad6e012bf5edef13c7c0333939d60c640c75460966f6df06414
                                                                                    • Instruction ID: d8026f782fe2c649bf3d5e648b7c690aec7a515d52077a52098a53c067127374
                                                                                    • Opcode Fuzzy Hash: 4b54a1d534956ad6e012bf5edef13c7c0333939d60c640c75460966f6df06414
                                                                                    • Instruction Fuzzy Hash: F6E0863490810CEBC754DF94E9449ADBBB5FB45310F10D59DDC0413380C7315E51EB94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899895501.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65d0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f61e62b3abf0e91cb4e4479f7e3b6ec20a815bbb2ca1e8a80918e424db2e5a05
                                                                                    • Instruction ID: ea4cfadf967e1f440deb54843be3587414193b5e7bb08f37436c1c3d1a472e48
                                                                                    • Opcode Fuzzy Hash: f61e62b3abf0e91cb4e4479f7e3b6ec20a815bbb2ca1e8a80918e424db2e5a05
                                                                                    • Instruction Fuzzy Hash: 7EE08C34908108DBC764DF98E5406ACBBB8BB45300F2085989C0913381CB319E02CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899895501.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65d0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f61e62b3abf0e91cb4e4479f7e3b6ec20a815bbb2ca1e8a80918e424db2e5a05
                                                                                    • Instruction ID: b0b689ecf7b224d413c4ba967b101c84886deb303e6dd85a71d235ddd0720300
                                                                                    • Opcode Fuzzy Hash: f61e62b3abf0e91cb4e4479f7e3b6ec20a815bbb2ca1e8a80918e424db2e5a05
                                                                                    • Instruction Fuzzy Hash: 0EE0EC34A0910CDBDB64EF98E5416ADBBB8BB45314F1095A9D80817381CB329E52DB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899750353.00000000065B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65b0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 96b4e24d1dde2fe427c72410198ffc0cf635ad741ff9f1d48652bf4f066b0e22
                                                                                    • Instruction ID: 01317557c869b4d63d3dcc114660792b3c8b488a90bd34a54b9ed987bf8147a9
                                                                                    • Opcode Fuzzy Hash: 96b4e24d1dde2fe427c72410198ffc0cf635ad741ff9f1d48652bf4f066b0e22
                                                                                    • Instruction Fuzzy Hash: A7E0EC34909108EFC744DFD4E9416ADBBB9BF46315F1096ADD80857341CB316E52DB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bfb955968793f90e8d1f6b7531743b8c08a52e2b1b440060d8a031a015fde596
                                                                                    • Instruction ID: 551c88174bc73b7061cff4f8b3b75d97b6003025843d1acf7f33a50197f44d96
                                                                                    • Opcode Fuzzy Hash: bfb955968793f90e8d1f6b7531743b8c08a52e2b1b440060d8a031a015fde596
                                                                                    • Instruction Fuzzy Hash: 90E08C7084010CDFCB40EFB4E50478E7BB8EB05201F0058A5A80593150EB354A0097A2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c70cc9b47f45bb64e566b9ba27da035aef40b18b04e84f2dfd621c83eeda4f99
                                                                                    • Instruction ID: 19d76cf87b39c4efc4da7cb438efe4da1fa338f050aca9c513f82496fac10089
                                                                                    • Opcode Fuzzy Hash: c70cc9b47f45bb64e566b9ba27da035aef40b18b04e84f2dfd621c83eeda4f99
                                                                                    • Instruction Fuzzy Hash: C1E01238A0910CDBCB44EFD4E9416ADBBB5FB45314F1095A9DC0917381CB315E52DB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899895501.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65d0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6285ca7bd2ea36c570af250e192a4be5c538d2befb2e6adfab93b96531946ff5
                                                                                    • Instruction ID: 284dd88764e6450665cf459c3504834a6cbb3c0fde348453a1924639a1f77c87
                                                                                    • Opcode Fuzzy Hash: 6285ca7bd2ea36c570af250e192a4be5c538d2befb2e6adfab93b96531946ff5
                                                                                    • Instruction Fuzzy Hash: 45E08C7094A0088FC7A5CF68E150378FB64BB42300F1498DC8C08072E1DB329A15DB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 46f3cf872633e4fec5644dce9bcd7d8e2e75dfb889d212f9c12ad670e17fae9a
                                                                                    • Instruction ID: f46bed820cf527009760330b236f8e80200e8eb7645fee2a86ca3916a9219668
                                                                                    • Opcode Fuzzy Hash: 46f3cf872633e4fec5644dce9bcd7d8e2e75dfb889d212f9c12ad670e17fae9a
                                                                                    • Instruction Fuzzy Hash: E4E0C230B0030CEFCF00EFB4D94166DB7F5DB44200F1085A8E808AB244DA319F009B80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899895501.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65d0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 85c2ea7cde995b6700b485c4d0ced105bf3e3b704fa79092675759734cb10b36
                                                                                    • Instruction ID: 9856caecbe9b3044d718111631f01f4669b287caf8c3c1bad6089a379cc03916
                                                                                    • Opcode Fuzzy Hash: 85c2ea7cde995b6700b485c4d0ced105bf3e3b704fa79092675759734cb10b36
                                                                                    • Instruction Fuzzy Hash: 54D05E3494910CDFC794CF98E500B69F7A8FB46314F1098989808433D1DB32AE01CA90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6c1216ddcc01135bac55c86c9a5bbeaeb9252413051dfc3f62edeb211bc1c8f9
                                                                                    • Instruction ID: 341b7b1625dc9d90659786fd1d4da0100357dd0b79d6be7f22ee64b55fafa86a
                                                                                    • Opcode Fuzzy Hash: 6c1216ddcc01135bac55c86c9a5bbeaeb9252413051dfc3f62edeb211bc1c8f9
                                                                                    • Instruction Fuzzy Hash: AFE0C770A0120CEFCB00EFA8EA4169DBBF9EB44300F1040A8E809E3300EA316F448B82
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c926c2354db3ef1acc8881bf9358066c48bc78c6a937f1bbbb661cd03ed5f27a
                                                                                    • Instruction ID: d13413b55c738371cd57fffc48a2574286f5b111d820897466c82685a8d6044f
                                                                                    • Opcode Fuzzy Hash: c926c2354db3ef1acc8881bf9358066c48bc78c6a937f1bbbb661cd03ed5f27a
                                                                                    • Instruction Fuzzy Hash: FFD05E3450910CDBC754CA94E911AADB7A8EB45314F54A498980943381CB329E01C680
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 06366ef9218081f4ba0c4addfca6029bfae8a3cffd7982fedde64cda08d138d4
                                                                                    • Instruction ID: 7bdb24db0ea11c22ea1107f803fb865ebde9761d3bd3967af1bf9b9371e228e1
                                                                                    • Opcode Fuzzy Hash: 06366ef9218081f4ba0c4addfca6029bfae8a3cffd7982fedde64cda08d138d4
                                                                                    • Instruction Fuzzy Hash: 39D0A72444C0C549EA1637793CD53FD26019B53431F685B969B2AC04E6CA1D44008081
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b3006b3138988f55490f9d9ca66245a3c0249dde6b7e12bc48ef7b1e1032471f
                                                                                    • Instruction ID: 864f7bd9f2edf71529891a721e13ca0858caf960036b4bfcf7b70671a7295c85
                                                                                    • Opcode Fuzzy Hash: b3006b3138988f55490f9d9ca66245a3c0249dde6b7e12bc48ef7b1e1032471f
                                                                                    • Instruction Fuzzy Hash: 09D012330145989FE342DB78E401ED4BF74EB0AA20F5448A0F58547232CA22D955C744
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4054951d880a3cd5a440225dfbf4e08d19d32e2179ff797e89044774716eec7f
                                                                                    • Instruction ID: 94dfdcb26516f6264aa52a57b0642b07862e9bdc5aa2723c3fad4f50caf03c9c
                                                                                    • Opcode Fuzzy Hash: 4054951d880a3cd5a440225dfbf4e08d19d32e2179ff797e89044774716eec7f
                                                                                    • Instruction Fuzzy Hash: ABC08C2014820C9AD1E437E9790D3FD3298BB01206F402806A60E400C18FB92010C1B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7b34c41a2626f41bf1e162c3c9a371dea03d1451e9facce2bf8e9c161f1967c8
                                                                                    • Instruction ID: 2c1d549920a8b8ae488a34453c99bd526696e9f6520454f6c8bc560b40bf4dfe
                                                                                    • Opcode Fuzzy Hash: 7b34c41a2626f41bf1e162c3c9a371dea03d1451e9facce2bf8e9c161f1967c8
                                                                                    • Instruction Fuzzy Hash: EBC08C36014108AFC300CB64E405C917FB8FF0A2203048494F6484B232C632ECA0CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 733a1c1ccb5284968e04949e9a23085afe141cada6b8f2bd93b773cd918b6280
                                                                                    • Instruction ID: 409d5211ffcef36c1a97027cfd6aba2eee2fddcaec2bf659075c501c13778dfe
                                                                                    • Opcode Fuzzy Hash: 733a1c1ccb5284968e04949e9a23085afe141cada6b8f2bd93b773cd918b6280
                                                                                    • Instruction Fuzzy Hash: 1DC08CB350C0C02EDA4B8B308A0A7157F209BA1200F054059A0908102AD6748414C304
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                                                    • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                                                                    • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                                                    • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0ba0cf16fc4c802563ecfe28f4d74143b687dd080270d78136bf2979e2b03ce5
                                                                                    • Instruction ID: c4495ddf3652645ad0aa780d83a25cbca4aab7cf81e744548a00088141b7575e
                                                                                    • Opcode Fuzzy Hash: 0ba0cf16fc4c802563ecfe28f4d74143b687dd080270d78136bf2979e2b03ce5
                                                                                    • Instruction Fuzzy Hash: DCA00274404214C6EB118A21941CB9EB571D706316F115455505562545877405545F56
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: TJcq$Te^q$xbaq
                                                                                    • API String ID: 0-3225726259
                                                                                    • Opcode ID: 002ec9238824508e1a87f43bd439ee6fceda9175566beef45ec86b1db11019b9
                                                                                    • Instruction ID: 3c4f32423c003f23fa72ff1c19f6fe67644214716d21560554da9c9cc45ddbbf
                                                                                    • Opcode Fuzzy Hash: 002ec9238824508e1a87f43bd439ee6fceda9175566beef45ec86b1db11019b9
                                                                                    • Instruction Fuzzy Hash: 7AB17575E016188FDB58DF6AD944ADDBBF2BF89300F14C1AAD809AB365DB305A81CF50
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (bq$,bq
                                                                                    • API String ID: 0-1616511919
                                                                                    • Opcode ID: d1a8da346d3d854eeab9a0ccb8a78ede0f0ae3462f4f3980b8a0ddffcc91c67d
                                                                                    • Instruction ID: 93fe6fda6e0a3a2705eee6beac32135e8cd104c18b25e709afa40a5834191dc7
                                                                                    • Opcode Fuzzy Hash: d1a8da346d3d854eeab9a0ccb8a78ede0f0ae3462f4f3980b8a0ddffcc91c67d
                                                                                    • Instruction Fuzzy Hash: C5D10A34A00205CFDB14EF69C594AADBBF6BF88710F25C4A9E806AB365D734EC81CB50
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 4'^q$4'^q
                                                                                    • API String ID: 0-2697143702
                                                                                    • Opcode ID: 2ce4d3828895d9df29d3880efd47d7cba0d0eef57640aeaf88ebb40d64f51d57
                                                                                    • Instruction ID: b6d856a847fc4527a26f49e5d2b39d9885ddde245b0e18a2e089fd6d44d110a7
                                                                                    • Opcode Fuzzy Hash: 2ce4d3828895d9df29d3880efd47d7cba0d0eef57640aeaf88ebb40d64f51d57
                                                                                    • Instruction Fuzzy Hash: 7C713FB4E452098FD708EFBEE95069ABBF3FBD8300F14C869D1049B269DB705A458F91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 4'^q$4'^q
                                                                                    • API String ID: 0-2697143702
                                                                                    • Opcode ID: f2c4a44f616d1db1227b71b55c980ae28ef288de5715cb4d20a3f604cf40f317
                                                                                    • Instruction ID: 9a5834485ad2223bb0bafdd8a9efd81a781c5a72a15abf803e7c0d3086a47aff
                                                                                    • Opcode Fuzzy Hash: f2c4a44f616d1db1227b71b55c980ae28ef288de5715cb4d20a3f604cf40f317
                                                                                    • Instruction Fuzzy Hash: 27712EB4E452098FD708EFBEE95069ABBF3FB98300F14D869D1049B268DB7059458F91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Te^q
                                                                                    • API String ID: 0-671973202
                                                                                    • Opcode ID: 172d650e8ad94aa2e11be06e8b19f76f7639d4f5afd74bf83f369ccdb9cb049b
                                                                                    • Instruction ID: 5dea354aaf808ea13921ca3d3901d762eb730042ad7d50f1bddb86b4154481cf
                                                                                    • Opcode Fuzzy Hash: 172d650e8ad94aa2e11be06e8b19f76f7639d4f5afd74bf83f369ccdb9cb049b
                                                                                    • Instruction Fuzzy Hash: DBB12A74E04219CFEB64DFA9E884BAEBBF2BF89300F1490A5D509A7395DB705981DF40
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: dbq
                                                                                    • API String ID: 0-1887291361
                                                                                    • Opcode ID: 5cc11b5b328c6e1e1f640c46af01819019b47e1bee1ee2babbfced0a2b35dc16
                                                                                    • Instruction ID: 2be418c1850536ed6921b0d297927f9b311031cf83bec3f7a435e36f1d012346
                                                                                    • Opcode Fuzzy Hash: 5cc11b5b328c6e1e1f640c46af01819019b47e1bee1ee2babbfced0a2b35dc16
                                                                                    • Instruction Fuzzy Hash: 11812974E05218CFDB54DFA8D544BADBBB2FB88300F209569D509A7365DB346E89CF80
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: dbq
                                                                                    • API String ID: 0-1887291361
                                                                                    • Opcode ID: 1f4810a82e3207ddca2726efe1d08db64e86091dfa16271806059861c0db6234
                                                                                    • Instruction ID: b5ef25cb0ca59ec3f369f851849016ebe98f139e731879227f6e5208ed98897b
                                                                                    • Opcode Fuzzy Hash: 1f4810a82e3207ddca2726efe1d08db64e86091dfa16271806059861c0db6234
                                                                                    • Instruction Fuzzy Hash: AD812974E05218CFDB54EFA8E9447ADBBB2FF48304F204569D509A7365DB346A89CF80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867535321.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_2770000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f91bcd869a93558892eda79f71b8ad37aa2e44d22e517e2885ee21082ff44473
                                                                                    • Instruction ID: ed545f8f453a38c43718af60889602880322c173ff1e3721a832c0cc3f131989
                                                                                    • Opcode Fuzzy Hash: f91bcd869a93558892eda79f71b8ad37aa2e44d22e517e2885ee21082ff44473
                                                                                    • Instruction Fuzzy Hash: D71298B0C827668AD712CF6AE98C1893BB1B741318FD0CB09D2652F6E5D7B4156BCF84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889184047.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_49c0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 76392e08d19e1acc52271f7f29d22b2344ae9c3c9d7e4f4dc2c96ee2d4d8ed3b
                                                                                    • Instruction ID: ea43e904cc22ae0a4ace5a21811ed40ed4be72c664fcdc45ec1e1875ec1f1983
                                                                                    • Opcode Fuzzy Hash: 76392e08d19e1acc52271f7f29d22b2344ae9c3c9d7e4f4dc2c96ee2d4d8ed3b
                                                                                    • Instruction Fuzzy Hash: 97D12474E05208CFEB14DFA9D994B9DBBF6FB88300F1080A9D519AB395DB706A85CF41
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867535321.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_2770000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 22bb2bbaf7e3b4a29016b3dc5cd3dff6103cb09207bc9edbe7ca110166e6fccf
                                                                                    • Instruction ID: 6bf7ab55313c8c94aa5e6f2c6ef265159a22555cbd6cd182d4d9ea551862720f
                                                                                    • Opcode Fuzzy Hash: 22bb2bbaf7e3b4a29016b3dc5cd3dff6103cb09207bc9edbe7ca110166e6fccf
                                                                                    • Instruction Fuzzy Hash: 95A17F36E0020ACFCF06DFB5C84459EB7B2FF85304B1585AAE905AB261DB71E956CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cd9531a7e182587de15e1c78c73137b9cdbd45b847d74094a6ca2f396978a2fe
                                                                                    • Instruction ID: 10ebd2a774f6adfefac3928e4359099b6809882807d6d262b7349b819038dbff
                                                                                    • Opcode Fuzzy Hash: cd9531a7e182587de15e1c78c73137b9cdbd45b847d74094a6ca2f396978a2fe
                                                                                    • Instruction Fuzzy Hash: 1CA11470E04208CFDB54DFA9D488BAEB7F2FB49300F2084A9D919AB364DB346985CF44
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: aa609f582f3da5fd68af34a83e63f1dbd9ff22304c5239b4d67d358327b82bee
                                                                                    • Instruction ID: 04c9810ea492f248613bccd7c22d141e8c9694586f607db00dd9b28f92063d0f
                                                                                    • Opcode Fuzzy Hash: aa609f582f3da5fd68af34a83e63f1dbd9ff22304c5239b4d67d358327b82bee
                                                                                    • Instruction Fuzzy Hash: E6A12670E04208CFDB54DFA9D488BAEB7F6BB49300F2084A9D919AB364DB346D85CF44
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1867535321.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_2770000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9f318272abcd813090f6df1c3c6058083771112e0e59cdee06aef776574eb660
                                                                                    • Instruction ID: 6704936e7668940a500ad59280503dc3be2145dfd0c5a5d49af245616ec20a46
                                                                                    • Opcode Fuzzy Hash: 9f318272abcd813090f6df1c3c6058083771112e0e59cdee06aef776574eb660
                                                                                    • Instruction Fuzzy Hash: E2C120B0C817668BD712CF2AE88C1897BB1BB46318F91CB09D1616F2D4DBB415ABCF44
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899895501.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65d0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ae3185d56b6712df369ffafcd9ddf8c9198aa760be7a42cd34b301144397ac0f
                                                                                    • Instruction ID: 4c68fb08bdbb403dae37509f3ef627d72fb3a83f603db7ea80c1243b4ecf8738
                                                                                    • Opcode Fuzzy Hash: ae3185d56b6712df369ffafcd9ddf8c9198aa760be7a42cd34b301144397ac0f
                                                                                    • Instruction Fuzzy Hash: A0910674E05208CFEB54EFA9E454AAEB7F6FB89300F205429D505AB3D8CB746985CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899895501.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65d0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 326f5bb6d35493b1138701d3b2921deedb804d42a8faceae2c2c029e9007bd8d
                                                                                    • Instruction ID: 65187a1d748281273e08fc78eb153f192327507d370ebfa31a6075170260caee
                                                                                    • Opcode Fuzzy Hash: 326f5bb6d35493b1138701d3b2921deedb804d42a8faceae2c2c029e9007bd8d
                                                                                    • Instruction Fuzzy Hash: 47911774E05208CFDB54EFA9E494AAEB7F2FB89300F205469D505AB394CB746D85CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899895501.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65d0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a0f6dbd484ea9be33f79453d1b90339d1b2278934127933a1662e1e616ef33b2
                                                                                    • Instruction ID: e3eca9d2664d4447b33529f2a7811040c782c2c3384172b625a20432cc55a71c
                                                                                    • Opcode Fuzzy Hash: a0f6dbd484ea9be33f79453d1b90339d1b2278934127933a1662e1e616ef33b2
                                                                                    • Instruction Fuzzy Hash: 35912770E05218CFEB64DFA8D854BAEB7B6FB89300F1084A9D519AB295CB705D85CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899750353.00000000065B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065B0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65b0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4578cfe70b62f7cb72ca22c2ee845fbd9f41d4ffc3434e36025ef9b24deff1ce
                                                                                    • Instruction ID: eb961144015aa0ae3545b1f847e4c3deadf7998cbe1a98bd6823f5609d56b5e1
                                                                                    • Opcode Fuzzy Hash: 4578cfe70b62f7cb72ca22c2ee845fbd9f41d4ffc3434e36025ef9b24deff1ce
                                                                                    • Instruction Fuzzy Hash: A191E574E05258CFEBA4DFA9C845BADBBB2BF49320F1094A9D409A7240DB345A86CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7633ba3de0603ba2f396db9a04badce504d38233cb88f5e182b638157afdfb74
                                                                                    • Instruction ID: e4060d1e240ed7b65b0063fc3bdbda971ee7110f126bfe386738e0ca55794680
                                                                                    • Opcode Fuzzy Hash: 7633ba3de0603ba2f396db9a04badce504d38233cb88f5e182b638157afdfb74
                                                                                    • Instruction Fuzzy Hash: F8910870E04208CFDB54DFA9D484BAEB7F2BB49300F2085A5D919AB269DB346D85CF44
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899895501.00000000065D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065D0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_65d0000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 20acbb5cea6b26953a602ac1f204fb850d2810969d48d566cc32de9412c1b575
                                                                                    • Instruction ID: dc80bb3573f467965b1eaeed6dec43bd8261f854acf2f9189d3f50f717be3c6b
                                                                                    • Opcode Fuzzy Hash: 20acbb5cea6b26953a602ac1f204fb850d2810969d48d566cc32de9412c1b575
                                                                                    • Instruction Fuzzy Hash: 17812C34E05218CFEB64EFA8D454BAEB7B2FB89300F1084A9D519AB395CB305D85CF91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5038d9d929a57365fead8322130457885317d478da3c7a0483dbdb7730770d22
                                                                                    • Instruction ID: 5510b2e33d81f99fbc4de5456081412eff955bd0bce1e73683db1339ee9c50ea
                                                                                    • Opcode Fuzzy Hash: 5038d9d929a57365fead8322130457885317d478da3c7a0483dbdb7730770d22
                                                                                    • Instruction Fuzzy Hash: 88414974E0A208EFDB00DFA8D4847EDBBF6EB49321F215429D909A7369E7746985CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1888963192.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4950000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1307147988f27cb7d8a40d928e481086d55ad80350b4ada89be67e534e9dfc23
                                                                                    • Instruction ID: ff9cf93683f1e79f3cef32cda7ae047c22556424a78cf1f09d963c67550a9048
                                                                                    • Opcode Fuzzy Hash: 1307147988f27cb7d8a40d928e481086d55ad80350b4ada89be67e534e9dfc23
                                                                                    • Instruction Fuzzy Hash: DE415974E06208EFDB00DFA8E4847EDBBF2FB49321F215429D909A7369E7746985CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899444834.0000000006360000.00000040.00000800.00020000.00000000.sdmp, Offset: 06360000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6360000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f7c9590d4d70590ac9eef0091ab2492328f260540018e17fe7984477fb4ecce4
                                                                                    • Instruction ID: 9b399e57fc20b4be2903261e48605ca58cfcc953657790851311756fefc28073
                                                                                    • Opcode Fuzzy Hash: f7c9590d4d70590ac9eef0091ab2492328f260540018e17fe7984477fb4ecce4
                                                                                    • Instruction Fuzzy Hash: 68514171D056188BEB6CCF2B8D557CAFAF7AFC9300F44C1FA994CA6264DB704A858E41
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1899444834.0000000006360000.00000040.00000800.00020000.00000000.sdmp, Offset: 06360000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6360000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8868e98675f72576b24d197b170704e45ce83766a507c827ea9dee220196e39f
                                                                                    • Instruction ID: fa07485c60d7fa30cbdbedd852f68875919d43e7778f4aa6af5f5535af2fe0c2
                                                                                    • Opcode Fuzzy Hash: 8868e98675f72576b24d197b170704e45ce83766a507c827ea9dee220196e39f
                                                                                    • Instruction Fuzzy Hash: AF515171D056588BEB2CCF2B8D456CAFAF3AFC9300F04C5FA954CA6264DB340A868F41
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d8f173826c52737b1cecbf42e3ed9db7e89cbfbe2fa8f856d6e1faae77afe887
                                                                                    • Instruction ID: 074338eb4be6d7e2fb26faddf1eeeaf6df8cec1827bbdf6b4a18695bd20855ec
                                                                                    • Opcode Fuzzy Hash: d8f173826c52737b1cecbf42e3ed9db7e89cbfbe2fa8f856d6e1faae77afe887
                                                                                    • Instruction Fuzzy Hash: F631C9B1D016188BEB58CF6BD9446DEBAF7AFC9300F04D4BAD849A6254DB700A818F41
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f9bc8fd99b98476098a8c4fcc30eba8051d2207874d39da113df6d8f51c4a89a
                                                                                    • Instruction ID: 79e693d1216b434597fff7417ac87bb8cc22c1a33910f9564e19c24ac6018c8e
                                                                                    • Opcode Fuzzy Hash: f9bc8fd99b98476098a8c4fcc30eba8051d2207874d39da113df6d8f51c4a89a
                                                                                    • Instruction Fuzzy Hash: CB3197B1D016188BEB68CF6BD94978EFAF7BFC8314F14C5A9C40CA6254DB750A858F01
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889747343.0000000005000000.00000040.00000800.00020000.00000000.sdmp, Offset: 05000000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_5000000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 08a0c666462358a03a4812996bc1939334d6a6c07ace02aba049bb2df820bd81
                                                                                    • Instruction ID: e8fa0e59b1f958be8b36581f77fe04f6108d268aff4bc04870eb88a2721d5947
                                                                                    • Opcode Fuzzy Hash: 08a0c666462358a03a4812996bc1939334d6a6c07ace02aba049bb2df820bd81
                                                                                    • Instruction Fuzzy Hash: ED319A71D016188BEB68CF6BC95578AFBF3BFC9304F14C1A9D40CA6254DB750A868F01
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (bq$4'^q$4'^q$4'^q$4'^q$pbq
                                                                                    • API String ID: 0-723292480
                                                                                    • Opcode ID: fff9c239ea5f5ffce50fa5f2058d30739879860d587f5586713c267c6e28357f
                                                                                    • Instruction ID: e6bf90c5879ce2b9e7136b2dcb9f2ea21d2edc896b6ffe0000e63dd6f8e6b3de
                                                                                    • Opcode Fuzzy Hash: fff9c239ea5f5ffce50fa5f2058d30739879860d587f5586713c267c6e28357f
                                                                                    • Instruction Fuzzy Hash: 9D519330A402098FC748EF7985546AFBBF7AFC8300F14892CC44AAB369DF35A9468791
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1889027227.0000000004960000.00000040.00000800.00020000.00000000.sdmp, Offset: 04960000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4960000_eBHn6qHPLz.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (_^q$(_^q$(_^q$(_^q
                                                                                    • API String ID: 0-2697572114
                                                                                    • Opcode ID: 634e0e3b65b1658997a14b96456b19e84185c3bc91b15ae9993ae13c5d80840b
                                                                                    • Instruction ID: 03952913464c6c4b6a050399bbfffe9972e4ed82e3aa2ad966513b17a93e6e02
                                                                                    • Opcode Fuzzy Hash: 634e0e3b65b1658997a14b96456b19e84185c3bc91b15ae9993ae13c5d80840b
                                                                                    • Instruction Fuzzy Hash: E371B374B042158FDB05DF78D4945AE7BB2EF89308B104869E446DB3A6EB35EC86CB90

                                                                                    Execution Graph

                                                                                    Execution Coverage:3.9%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:5.8%
                                                                                    Total number of Nodes:1164
                                                                                    Total number of Limit Nodes:48
                                                                                    execution_graph 45632 446f43 GetLastError 45633 446f5c 45632->45633 45634 446f62 45632->45634 45658 447466 11 API calls 2 library calls 45633->45658 45638 446fb9 SetLastError 45634->45638 45651 448706 45634->45651 45640 446fc2 45638->45640 45639 446f7c 45659 446ac5 45639->45659 45643 446f91 45643->45639 45645 446f98 45643->45645 45644 446f82 45647 446fb0 SetLastError 45644->45647 45666 446d31 20 API calls __dosmaperr 45645->45666 45647->45640 45648 446fa3 45649 446ac5 _free 17 API calls 45648->45649 45650 446fa9 45649->45650 45650->45638 45650->45647 45652 448713 _strftime 45651->45652 45653 448753 45652->45653 45654 44873e RtlAllocateHeap 45652->45654 45667 442200 7 API calls 2 library calls 45652->45667 45668 445354 20 API calls __dosmaperr 45653->45668 45654->45652 45656 446f74 45654->45656 45656->45639 45665 4474bc 11 API calls 2 library calls 45656->45665 45658->45634 45660 446ad0 RtlFreeHeap 45659->45660 45661 446af9 _free 45659->45661 45660->45661 45662 446ae5 45660->45662 45661->45644 45669 445354 20 API calls __dosmaperr 45662->45669 45664 446aeb GetLastError 45664->45661 45665->45643 45666->45648 45667->45652 45668->45656 45669->45664 45670 43a998 45672 43a9a4 _swprintf ___scrt_is_nonwritable_in_current_image 45670->45672 45671 43a9b2 45686 445354 20 API calls __dosmaperr 45671->45686 45672->45671 45674 43a9dc 45672->45674 45681 444acc EnterCriticalSection 45674->45681 45676 43a9b7 _strftime std::_Locinfo::_Locinfo_dtor 45677 43a9e7 45682 43aa88 45677->45682 45681->45677 45684 43aa96 45682->45684 45683 43a9f2 45687 43aa0f LeaveCriticalSection std::_Lockit::~_Lockit 45683->45687 45684->45683 45688 448416 36 API calls 2 library calls 45684->45688 45686->45676 45687->45676 45688->45684 45689 414dba 45704 41a51b 45689->45704 45691 414dc3 45714 401fbd 45691->45714 45696 4161f2 45737 401d8c 45696->45737 45699 4161fb 45700 401eea 11 API calls 45699->45700 45701 416207 45700->45701 45702 401eea 11 API calls 45701->45702 45703 416213 45702->45703 45705 41a529 45704->45705 45743 43a88c 45705->45743 45708 41a55c InternetReadFile 45711 41a57f 45708->45711 45710 41a5ac InternetCloseHandle InternetCloseHandle 45712 41a5be 45710->45712 45711->45708 45711->45710 45713 401eea 11 API calls 45711->45713 45750 401f86 45711->45750 45712->45691 45713->45711 45715 401fcc 45714->45715 45761 402501 45715->45761 45717 401fea 45718 404468 45717->45718 45719 40447b 45718->45719 45766 404be8 45719->45766 45721 404490 _Yarn 45722 404507 WaitForSingleObject 45721->45722 45723 4044e7 45721->45723 45725 40451d 45722->45725 45724 4044f9 send 45723->45724 45726 404542 45724->45726 45770 42051a 54 API calls 45725->45770 45729 401eea 11 API calls 45726->45729 45728 404530 SetEvent 45728->45726 45730 40454a 45729->45730 45731 401eea 11 API calls 45730->45731 45732 404552 45731->45732 45732->45696 45733 401eea 45732->45733 45735 4021b9 45733->45735 45734 4021e8 45734->45696 45735->45734 45776 40262e 11 API calls _Deallocate 45735->45776 45739 40200a 45737->45739 45738 40203a 45738->45699 45739->45738 45777 402654 11 API calls 45739->45777 45741 40202b 45778 4026ba 11 API calls _Deallocate 45741->45778 45748 446aff _strftime 45743->45748 45744 446b3d 45755 445354 20 API calls __dosmaperr 45744->45755 45745 446b28 RtlAllocateHeap 45747 41a533 InternetOpenW InternetOpenUrlW 45745->45747 45745->45748 45747->45708 45748->45744 45748->45745 45754 442200 7 API calls 2 library calls 45748->45754 45751 401f8e 45750->45751 45756 402325 45751->45756 45753 401fa4 45753->45711 45754->45748 45755->45747 45757 40232f 45756->45757 45759 40233a 45757->45759 45760 40294a 28 API calls 45757->45760 45759->45753 45760->45759 45762 40250d 45761->45762 45764 40252b 45762->45764 45765 40261a 28 API calls 45762->45765 45764->45717 45765->45764 45767 404bf0 45766->45767 45771 404c0c 45767->45771 45769 404c06 45769->45721 45770->45728 45772 404c16 45771->45772 45774 404c21 45772->45774 45775 404d07 28 API calls 45772->45775 45774->45769 45775->45774 45776->45734 45777->45741 45778->45738 45779 4339be 45780 4339ca ___scrt_is_nonwritable_in_current_image 45779->45780 45811 4336b3 45780->45811 45782 4339d1 45783 433b24 45782->45783 45786 4339fb 45782->45786 46111 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 45783->46111 45785 433b2b 46112 4426be 28 API calls _Atexit 45785->46112 45796 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 45786->45796 46105 4434d1 5 API calls CatchGuardHandler 45786->46105 45788 433b31 46113 442670 28 API calls _Atexit 45788->46113 45791 433a14 45793 433a1a 45791->45793 46106 443475 5 API calls CatchGuardHandler 45791->46106 45792 433b39 45795 433a9b 45822 433c5e 45795->45822 45796->45795 46107 43edf4 35 API calls 4 library calls 45796->46107 45805 433abd 45805->45785 45806 433ac1 45805->45806 45807 433aca 45806->45807 46109 442661 28 API calls _Atexit 45806->46109 46110 433842 13 API calls 2 library calls 45807->46110 45810 433ad2 45810->45793 45812 4336bc 45811->45812 46114 433e0a IsProcessorFeaturePresent 45812->46114 45814 4336c8 46115 4379ee 10 API calls 3 library calls 45814->46115 45816 4336d1 45816->45782 45817 4336cd 45817->45816 46116 44335e 45817->46116 45820 4336e8 45820->45782 46132 436050 45822->46132 45825 433aa1 45826 443422 45825->45826 46134 44ddc9 45826->46134 45828 44342b 45829 433aaa 45828->45829 46138 44e0d3 35 API calls 45828->46138 45831 40d767 45829->45831 46140 41bce3 LoadLibraryA GetProcAddress 45831->46140 45833 40d783 GetModuleFileNameW 46145 40e168 45833->46145 45835 40d79f 45836 401fbd 28 API calls 45835->45836 45837 40d7ae 45836->45837 45838 401fbd 28 API calls 45837->45838 45839 40d7bd 45838->45839 46160 41afc3 45839->46160 45843 40d7cf 45844 401d8c 11 API calls 45843->45844 45845 40d7d8 45844->45845 45846 40d835 45845->45846 45847 40d7eb 45845->45847 46185 401d64 45846->46185 46433 40e986 90 API calls 45847->46433 45850 40d845 45853 401d64 28 API calls 45850->45853 45851 40d7fd 45852 401d64 28 API calls 45851->45852 45855 40d809 45852->45855 45854 40d864 45853->45854 46190 404cbf 45854->46190 46434 40e937 65 API calls 45855->46434 45857 40d873 46194 405ce6 45857->46194 45860 40d87f 46197 401eef 45860->46197 45861 40d824 46435 40e155 65 API calls 45861->46435 45864 40d88b 45865 401eea 11 API calls 45864->45865 45866 40d894 45865->45866 45868 401eea 11 API calls 45866->45868 45867 401eea 11 API calls 45869 40dc9f 45867->45869 45870 40d89d 45868->45870 46108 433c94 GetModuleHandleW 45869->46108 45871 401d64 28 API calls 45870->45871 45872 40d8a6 45871->45872 46201 401ebd 45872->46201 45874 40d8b1 45875 401d64 28 API calls 45874->45875 45876 40d8ca 45875->45876 45877 401d64 28 API calls 45876->45877 45879 40d8e5 45877->45879 45878 40d946 45880 401d64 28 API calls 45878->45880 45895 40e134 45878->45895 45879->45878 46436 4085b4 45879->46436 45886 40d95d 45880->45886 45882 40d912 45883 401eef 11 API calls 45882->45883 45884 40d91e 45883->45884 45887 401eea 11 API calls 45884->45887 45885 40d9a4 46205 40bed7 45885->46205 45886->45885 45892 4124b7 3 API calls 45886->45892 45889 40d927 45887->45889 46440 4124b7 RegOpenKeyExA 45889->46440 45890 40d9aa 45891 40d82d 45890->45891 46208 41a463 45890->46208 45891->45867 45897 40d988 45892->45897 46518 412902 30 API calls 45895->46518 45896 40d9c5 45898 40da18 45896->45898 46225 40697b 45896->46225 45897->45885 46443 412902 30 API calls 45897->46443 45901 401d64 28 API calls 45898->45901 45903 40da21 45901->45903 45912 40da32 45903->45912 45913 40da2d 45903->45913 45905 40e14a 46519 4112b5 64 API calls ___scrt_fastfail 45905->46519 45906 40d9e4 46444 40699d 30 API calls 45906->46444 45907 40d9ee 45911 401d64 28 API calls 45907->45911 45920 40d9f7 45911->45920 45917 401d64 28 API calls 45912->45917 46447 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 45913->46447 45914 40d9e9 46445 4064d0 97 API calls 45914->46445 45918 40da3b 45917->45918 46229 41ae08 45918->46229 45920->45898 45923 40da13 45920->45923 45921 40da46 46233 401e18 45921->46233 46446 4064d0 97 API calls 45923->46446 45924 40da51 46237 401e13 45924->46237 45927 40da5a 45928 401d64 28 API calls 45927->45928 45929 40da63 45928->45929 45930 401d64 28 API calls 45929->45930 45931 40da7d 45930->45931 45932 401d64 28 API calls 45931->45932 45933 40da97 45932->45933 45934 401d64 28 API calls 45933->45934 45936 40dab0 45934->45936 45935 40db1d 45937 40db2c 45935->45937 45944 40dcaa ___scrt_fastfail 45935->45944 45936->45935 45938 401d64 28 API calls 45936->45938 45939 40db35 45937->45939 45967 40dbb1 ___scrt_fastfail 45937->45967 45942 40dac5 _wcslen 45938->45942 45940 401d64 28 API calls 45939->45940 45941 40db3e 45940->45941 45943 401d64 28 API calls 45941->45943 45942->45935 45945 401d64 28 API calls 45942->45945 45946 40db50 45943->45946 46507 41265d RegOpenKeyExA 45944->46507 45947 40dae0 45945->45947 45949 401d64 28 API calls 45946->45949 45951 401d64 28 API calls 45947->45951 45950 40db62 45949->45950 45954 401d64 28 API calls 45950->45954 45952 40daf5 45951->45952 46448 40c89e 45952->46448 45953 40dcef 45955 401d64 28 API calls 45953->45955 45956 40db8b 45954->45956 45957 40dd16 45955->45957 45962 401d64 28 API calls 45956->45962 46251 401f66 45957->46251 45960 401e18 11 API calls 45961 40db14 45960->45961 45964 401e13 11 API calls 45961->45964 45965 40db9c 45962->45965 45964->45935 46505 40bc67 45 API calls _wcslen 45965->46505 45966 40dd25 46255 4126d2 RegCreateKeyA 45966->46255 46241 4128a2 45967->46241 45972 40dc45 ctype 45976 401d64 28 API calls 45972->45976 45973 40dbac 45973->45967 45974 401d64 28 API calls 45975 40dd47 45974->45975 46261 43a5e7 45975->46261 45977 40dc5c 45976->45977 45977->45953 45981 40dc70 45977->45981 45980 40dd5e 46510 41beb0 86 API calls ___scrt_fastfail 45980->46510 45982 401d64 28 API calls 45981->45982 45985 40dc7e 45982->45985 45984 40dd81 45988 401f66 28 API calls 45984->45988 45986 41ae08 28 API calls 45985->45986 45990 40dc87 45986->45990 45987 40dd65 CreateThread 45987->45984 47065 41c96f 10 API calls 45987->47065 45989 40dd96 45988->45989 45991 401f66 28 API calls 45989->45991 46506 40e219 109 API calls 45990->46506 45993 40dda5 45991->45993 46265 41a686 45993->46265 45994 40dc8c 45994->45953 45996 40dc93 45994->45996 45996->45891 45998 401d64 28 API calls 45999 40ddb6 45998->45999 46000 401d64 28 API calls 45999->46000 46001 40ddcb 46000->46001 46002 401d64 28 API calls 46001->46002 46003 40ddeb 46002->46003 46004 43a5e7 39 API calls 46003->46004 46005 40ddf8 46004->46005 46006 401d64 28 API calls 46005->46006 46007 40de03 46006->46007 46008 401d64 28 API calls 46007->46008 46009 40de14 46008->46009 46010 401d64 28 API calls 46009->46010 46011 40de29 46010->46011 46012 401d64 28 API calls 46011->46012 46013 40de3a 46012->46013 46014 40de41 StrToIntA 46013->46014 46289 409517 46014->46289 46017 401d64 28 API calls 46018 40de5c 46017->46018 46019 40dea1 46018->46019 46020 40de68 46018->46020 46022 401d64 28 API calls 46019->46022 46511 43360d 22 API calls 3 library calls 46020->46511 46024 40deb1 46022->46024 46023 40de71 46025 401d64 28 API calls 46023->46025 46027 40def9 46024->46027 46028 40debd 46024->46028 46026 40de84 46025->46026 46029 40de8b CreateThread 46026->46029 46031 401d64 28 API calls 46027->46031 46512 43360d 22 API calls 3 library calls 46028->46512 46029->46019 47068 419128 102 API calls __EH_prolog 46029->47068 46033 40df02 46031->46033 46032 40dec6 46034 401d64 28 API calls 46032->46034 46036 40df6c 46033->46036 46037 40df0e 46033->46037 46035 40ded8 46034->46035 46040 40dedf CreateThread 46035->46040 46038 401d64 28 API calls 46036->46038 46039 401d64 28 API calls 46037->46039 46041 40df75 46038->46041 46042 40df1e 46039->46042 46040->46027 47067 419128 102 API calls __EH_prolog 46040->47067 46043 40df81 46041->46043 46044 40dfba 46041->46044 46045 401d64 28 API calls 46042->46045 46047 401d64 28 API calls 46043->46047 46314 41a7a2 GetComputerNameExW GetUserNameW 46044->46314 46048 40df33 46045->46048 46050 40df8a 46047->46050 46513 40c854 31 API calls 46048->46513 46055 401d64 28 API calls 46050->46055 46051 401e18 11 API calls 46052 40dfce 46051->46052 46054 401e13 11 API calls 46052->46054 46057 40dfd7 46054->46057 46058 40df9f 46055->46058 46056 40df46 46059 401e18 11 API calls 46056->46059 46060 40dfe0 SetProcessDEPPolicy 46057->46060 46061 40dfe3 CreateThread 46057->46061 46069 43a5e7 39 API calls 46058->46069 46062 40df52 46059->46062 46060->46061 46063 40e004 46061->46063 46064 40dff8 CreateThread 46061->46064 47036 40e54f 46061->47036 46065 401e13 11 API calls 46062->46065 46067 40e019 46063->46067 46068 40e00d CreateThread 46063->46068 46064->46063 47063 410f36 138 API calls 46064->47063 46066 40df5b CreateThread 46065->46066 46066->46036 47064 40196b 49 API calls 46066->47064 46071 40e073 46067->46071 46073 401f66 28 API calls 46067->46073 46068->46067 47066 411524 38 API calls ___scrt_fastfail 46068->47066 46070 40dfac 46069->46070 46514 40b95c 7 API calls 46070->46514 46325 41246e RegOpenKeyExA 46071->46325 46074 40e046 46073->46074 46515 404c9e 28 API calls 46074->46515 46078 40e053 46080 401f66 28 API calls 46078->46080 46079 40e12a 46337 40cbac 46079->46337 46082 40e062 46080->46082 46081 41ae08 28 API calls 46084 40e0a4 46081->46084 46085 41a686 79 API calls 46082->46085 46328 412584 RegOpenKeyExW 46084->46328 46087 40e067 46085->46087 46089 401eea 11 API calls 46087->46089 46089->46071 46092 401e13 11 API calls 46095 40e0c5 46092->46095 46093 40e0ed DeleteFileW 46094 40e0f4 46093->46094 46093->46095 46096 41ae08 28 API calls 46094->46096 46095->46093 46095->46094 46097 40e0db Sleep 46095->46097 46098 40e104 46096->46098 46516 401e07 46097->46516 46333 41297a RegOpenKeyExW 46098->46333 46101 40e117 46102 401e13 11 API calls 46101->46102 46103 40e121 46102->46103 46104 401e13 11 API calls 46103->46104 46104->46079 46105->45791 46106->45796 46107->45795 46108->45805 46109->45807 46110->45810 46111->45785 46112->45788 46113->45792 46114->45814 46115->45817 46120 44e949 46116->46120 46119 437a17 8 API calls 3 library calls 46119->45816 46123 44e962 46120->46123 46122 4336da 46122->45820 46122->46119 46124 433d2c 46123->46124 46125 433d37 IsProcessorFeaturePresent 46124->46125 46126 433d35 46124->46126 46128 4341a4 46125->46128 46126->46122 46131 434168 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46128->46131 46130 434287 46130->46122 46131->46130 46133 433c71 GetStartupInfoW 46132->46133 46133->45825 46135 44ddd2 46134->46135 46137 44dddb 46134->46137 46139 44dcc8 48 API calls 3 library calls 46135->46139 46137->45828 46138->45828 46139->46137 46141 41bd22 LoadLibraryA GetProcAddress 46140->46141 46142 41bd12 GetModuleHandleA GetProcAddress 46140->46142 46143 41bd4b 32 API calls 46141->46143 46144 41bd3b LoadLibraryA GetProcAddress 46141->46144 46142->46141 46143->45833 46144->46143 46520 41a63f FindResourceA 46145->46520 46148 43a88c ___std_exception_copy 21 API calls 46149 40e192 _Yarn 46148->46149 46150 401f86 28 API calls 46149->46150 46151 40e1ad 46150->46151 46152 401eef 11 API calls 46151->46152 46153 40e1b8 46152->46153 46154 401eea 11 API calls 46153->46154 46155 40e1c1 46154->46155 46156 43a88c ___std_exception_copy 21 API calls 46155->46156 46157 40e1d2 _Yarn 46156->46157 46523 406052 46157->46523 46159 40e205 46159->45835 46180 41afd6 46160->46180 46161 41b046 46162 401eea 11 API calls 46161->46162 46163 41b078 46162->46163 46165 401eea 11 API calls 46163->46165 46164 41b048 46166 403b60 28 API calls 46164->46166 46168 41b080 46165->46168 46169 41b054 46166->46169 46170 401eea 11 API calls 46168->46170 46171 401eef 11 API calls 46169->46171 46173 40d7c6 46170->46173 46174 41b05d 46171->46174 46172 401eef 11 API calls 46172->46180 46181 40e8bd 46173->46181 46175 401eea 11 API calls 46174->46175 46177 41b065 46175->46177 46176 401eea 11 API calls 46176->46180 46530 41bfa9 28 API calls 46177->46530 46180->46161 46180->46164 46180->46172 46180->46176 46526 403b60 46180->46526 46529 41bfa9 28 API calls 46180->46529 46182 40e8ca 46181->46182 46184 40e8da 46182->46184 46547 40200a 11 API calls 46182->46547 46184->45843 46186 401d6c 46185->46186 46188 401d74 46186->46188 46548 401fff 28 API calls 46186->46548 46188->45850 46189 401d8b 46191 404ccb 46190->46191 46549 402e78 46191->46549 46193 404cee 46193->45857 46558 404bc4 46194->46558 46196 405cf4 46196->45860 46198 401efe 46197->46198 46200 401f0a 46198->46200 46567 4021b9 11 API calls 46198->46567 46200->45864 46203 401ec9 46201->46203 46202 401ee4 46202->45874 46203->46202 46204 402325 28 API calls 46203->46204 46204->46202 46568 401e8f 46205->46568 46207 40bee1 CreateMutexA GetLastError 46207->45890 46570 41b15b 46208->46570 46213 401eef 11 API calls 46214 41a49f 46213->46214 46215 401eea 11 API calls 46214->46215 46216 41a4a7 46215->46216 46217 41a4fa 46216->46217 46218 412513 31 API calls 46216->46218 46217->45896 46219 41a4cd 46218->46219 46220 41a4d8 StrToIntA 46219->46220 46221 41a4ef 46220->46221 46222 41a4e6 46220->46222 46224 401eea 11 API calls 46221->46224 46578 41c102 22 API calls 46222->46578 46224->46217 46226 40698f 46225->46226 46227 4124b7 3 API calls 46226->46227 46228 406996 46227->46228 46228->45906 46228->45907 46230 41ae1c 46229->46230 46579 40b027 46230->46579 46232 41ae24 46232->45921 46234 401e27 46233->46234 46236 401e33 46234->46236 46588 402121 11 API calls 46234->46588 46236->45924 46239 402121 46237->46239 46238 402150 46238->45927 46239->46238 46589 402718 11 API calls _Deallocate 46239->46589 46242 4128c0 46241->46242 46243 406052 28 API calls 46242->46243 46244 4128d5 46243->46244 46245 401fbd 28 API calls 46244->46245 46246 4128e5 46245->46246 46247 4126d2 14 API calls 46246->46247 46248 4128ef 46247->46248 46249 401eea 11 API calls 46248->46249 46250 4128fc 46249->46250 46250->45972 46252 401f6e 46251->46252 46590 402301 46252->46590 46256 412722 46255->46256 46259 4126eb 46255->46259 46257 401eea 11 API calls 46256->46257 46258 40dd3b 46257->46258 46258->45974 46260 4126fd RegSetValueExA RegCloseKey 46259->46260 46260->46256 46262 43a600 _swprintf 46261->46262 46594 43993e 46262->46594 46264 40dd54 46264->45980 46264->45984 46266 41a737 46265->46266 46267 41a69c GetLocalTime 46265->46267 46269 401eea 11 API calls 46266->46269 46268 404cbf 28 API calls 46267->46268 46270 41a6de 46268->46270 46271 41a73f 46269->46271 46272 405ce6 28 API calls 46270->46272 46273 401eea 11 API calls 46271->46273 46274 41a6ea 46272->46274 46275 40ddaa 46273->46275 46622 4027cb 46274->46622 46275->45998 46277 41a6f6 46278 405ce6 28 API calls 46277->46278 46279 41a702 46278->46279 46625 406478 76 API calls 46279->46625 46281 41a710 46282 401eea 11 API calls 46281->46282 46283 41a71c 46282->46283 46284 401eea 11 API calls 46283->46284 46285 41a725 46284->46285 46286 401eea 11 API calls 46285->46286 46287 41a72e 46286->46287 46288 401eea 11 API calls 46287->46288 46288->46266 46290 409536 _wcslen 46289->46290 46291 409541 46290->46291 46292 409558 46290->46292 46293 40c89e 31 API calls 46291->46293 46294 40c89e 31 API calls 46292->46294 46295 409549 46293->46295 46296 409560 46294->46296 46297 401e18 11 API calls 46295->46297 46298 401e18 11 API calls 46296->46298 46313 409553 46297->46313 46299 40956e 46298->46299 46300 401e13 11 API calls 46299->46300 46302 409576 46300->46302 46301 401e13 11 API calls 46303 4095ad 46301->46303 46645 40856b 28 API calls 46302->46645 46630 409837 46303->46630 46306 409588 46646 4028cf 46306->46646 46309 409593 46310 401e18 11 API calls 46309->46310 46311 40959d 46310->46311 46312 401e13 11 API calls 46311->46312 46312->46313 46313->46301 46672 403b40 46314->46672 46318 41a7fd 46319 4028cf 28 API calls 46318->46319 46320 41a807 46319->46320 46321 401e13 11 API calls 46320->46321 46322 41a810 46321->46322 46323 401e13 11 API calls 46322->46323 46324 40dfc3 46323->46324 46324->46051 46326 40e08b 46325->46326 46327 41248f RegQueryValueExA RegCloseKey 46325->46327 46326->46079 46326->46081 46327->46326 46329 4125b0 RegQueryValueExW RegCloseKey 46328->46329 46330 4125dd 46328->46330 46329->46330 46331 403b40 28 API calls 46330->46331 46332 40e0ba 46331->46332 46332->46092 46334 412992 RegDeleteValueW 46333->46334 46335 4129a6 46333->46335 46334->46335 46336 4129a2 46334->46336 46335->46101 46336->46101 46338 40cbc5 46337->46338 46339 41246e 3 API calls 46338->46339 46340 40cbcc 46339->46340 46344 40cbeb 46340->46344 46699 401602 46340->46699 46342 40cbd9 46702 4127d5 RegCreateKeyA 46342->46702 46345 413fd4 46344->46345 46346 413feb 46345->46346 46716 41aa73 46346->46716 46348 413ff6 46349 401d64 28 API calls 46348->46349 46350 41400f 46349->46350 46351 43a5e7 39 API calls 46350->46351 46352 41401c 46351->46352 46353 414021 Sleep 46352->46353 46354 41402e 46352->46354 46353->46354 46355 401f66 28 API calls 46354->46355 46356 41403d 46355->46356 46357 401d64 28 API calls 46356->46357 46358 41404b 46357->46358 46359 401fbd 28 API calls 46358->46359 46360 414053 46359->46360 46361 41afc3 28 API calls 46360->46361 46362 41405b 46361->46362 46720 404262 WSAStartup 46362->46720 46364 414065 46365 401d64 28 API calls 46364->46365 46366 41406e 46365->46366 46367 401d64 28 API calls 46366->46367 46428 4140ed 46366->46428 46368 414087 46367->46368 46370 401d64 28 API calls 46368->46370 46369 401fbd 28 API calls 46369->46428 46371 414098 46370->46371 46373 401d64 28 API calls 46371->46373 46372 41afc3 28 API calls 46372->46428 46374 4140a9 46373->46374 46376 401d64 28 API calls 46374->46376 46375 4085b4 28 API calls 46375->46428 46377 4140ba 46376->46377 46379 401d64 28 API calls 46377->46379 46378 401eef 11 API calls 46378->46428 46380 4140cb 46379->46380 46381 401d64 28 API calls 46380->46381 46382 4140dd 46381->46382 46862 404101 88 API calls 46382->46862 46384 401d64 28 API calls 46384->46428 46386 414244 WSAGetLastError 46863 41bc76 30 API calls 46386->46863 46391 401f66 28 API calls 46392 414259 46391->46392 46392->46391 46394 41a686 79 API calls 46392->46394 46397 401d64 28 API calls 46392->46397 46398 401d8c 11 API calls 46392->46398 46399 43a5e7 39 API calls 46392->46399 46392->46428 46430 414b22 CreateThread 46392->46430 46431 401eea 11 API calls 46392->46431 46432 401e13 11 API calls 46392->46432 46864 404c9e 28 API calls 46392->46864 46865 40a767 84 API calls 46392->46865 46866 4047eb 98 API calls 46392->46866 46394->46392 46396 404cbf 28 API calls 46396->46428 46397->46392 46398->46392 46400 414b80 Sleep 46399->46400 46400->46392 46401 401f66 28 API calls 46401->46428 46402 41a686 79 API calls 46402->46428 46405 4082dc 28 API calls 46405->46428 46407 41265d 3 API calls 46407->46428 46408 412513 31 API calls 46408->46428 46409 403b40 28 API calls 46409->46428 46412 41aec8 28 API calls 46412->46428 46413 41ad46 28 API calls 46413->46428 46414 401d64 28 API calls 46415 4144ed GetTickCount 46414->46415 46828 41ad46 46415->46828 46421 40275c 28 API calls 46421->46428 46422 405ce6 28 API calls 46422->46428 46423 4027cb 28 API calls 46423->46428 46424 404468 61 API calls 46424->46428 46425 401eea 11 API calls 46425->46428 46426 401e13 11 API calls 46426->46428 46428->46369 46428->46372 46428->46375 46428->46378 46428->46384 46428->46386 46428->46392 46428->46396 46428->46401 46428->46402 46428->46405 46428->46407 46428->46408 46428->46409 46428->46412 46428->46413 46428->46414 46428->46421 46428->46422 46428->46423 46428->46424 46428->46425 46428->46426 46721 413f9a 46428->46721 46727 4041f1 46428->46727 46734 404915 46428->46734 46749 40428c connect 46428->46749 46809 41a96d 46428->46809 46812 413683 46428->46812 46815 440c51 46428->46815 46819 40cbf1 46428->46819 46825 41adee 46428->46825 46833 41aca0 46428->46833 46835 41ac52 46428->46835 46840 40e679 GetLocaleInfoA 46428->46840 46843 4027ec 46428->46843 46847 4045d5 46428->46847 46430->46392 47029 419e89 104 API calls 46430->47029 46431->46392 46432->46392 46433->45851 46434->45861 46437 4085c0 46436->46437 46438 402e78 28 API calls 46437->46438 46439 4085e4 46438->46439 46439->45882 46441 4124e1 RegQueryValueExA RegCloseKey 46440->46441 46442 41250b 46440->46442 46441->46442 46442->45878 46443->45885 46444->45914 46445->45907 46446->45898 46447->45912 46449 40c8ba 46448->46449 46450 40c8da 46449->46450 46451 40c90f 46449->46451 46455 40c8d0 46449->46455 47030 41a74b 29 API calls 46450->47030 46454 41b15b GetCurrentProcess 46451->46454 46453 40ca03 GetLongPathNameW 46457 403b40 28 API calls 46453->46457 46458 40c914 46454->46458 46455->46453 46456 40c8e3 46459 401e18 11 API calls 46456->46459 46460 40ca18 46457->46460 46461 40c918 46458->46461 46462 40c96a 46458->46462 46464 40c8ed 46459->46464 46465 403b40 28 API calls 46460->46465 46463 403b40 28 API calls 46461->46463 46466 403b40 28 API calls 46462->46466 46468 40c926 46463->46468 46470 401e13 11 API calls 46464->46470 46469 40ca27 46465->46469 46467 40c978 46466->46467 46474 403b40 28 API calls 46467->46474 46475 403b40 28 API calls 46468->46475 47033 40cc37 28 API calls 46469->47033 46470->46455 46472 40ca3a 47034 402860 28 API calls 46472->47034 46477 40c98e 46474->46477 46478 40c93c 46475->46478 46476 40ca45 47035 402860 28 API calls 46476->47035 47032 402860 28 API calls 46477->47032 47031 402860 28 API calls 46478->47031 46482 40ca4f 46485 401e13 11 API calls 46482->46485 46483 40c999 46486 401e18 11 API calls 46483->46486 46484 40c947 46487 401e18 11 API calls 46484->46487 46488 40ca59 46485->46488 46489 40c9a4 46486->46489 46490 40c952 46487->46490 46491 401e13 11 API calls 46488->46491 46492 401e13 11 API calls 46489->46492 46493 401e13 11 API calls 46490->46493 46494 40ca62 46491->46494 46495 40c9ad 46492->46495 46496 40c95b 46493->46496 46497 401e13 11 API calls 46494->46497 46498 401e13 11 API calls 46495->46498 46499 401e13 11 API calls 46496->46499 46500 40ca6b 46497->46500 46498->46464 46499->46464 46501 401e13 11 API calls 46500->46501 46502 40ca74 46501->46502 46503 401e13 11 API calls 46502->46503 46504 40ca7d 46503->46504 46504->45960 46505->45973 46506->45994 46508 412683 RegQueryValueExA RegCloseKey 46507->46508 46509 4126a7 46507->46509 46508->46509 46509->45953 46510->45987 46511->46023 46512->46032 46513->46056 46514->46044 46515->46078 46517 401e0c 46516->46517 46518->45905 46521 40e183 46520->46521 46522 41a65c LoadResource LockResource SizeofResource 46520->46522 46521->46148 46522->46521 46524 401f86 28 API calls 46523->46524 46525 406066 46524->46525 46525->46159 46531 403c30 46526->46531 46529->46180 46530->46161 46532 403c39 46531->46532 46535 403c59 46532->46535 46536 403c68 46535->46536 46541 4032a4 46536->46541 46538 403c74 46539 402325 28 API calls 46538->46539 46540 403b73 46539->46540 46540->46180 46542 4032b0 46541->46542 46543 4032ad 46541->46543 46546 4032b6 22 API calls 46542->46546 46543->46538 46547->46184 46548->46189 46550 402e85 46549->46550 46551 402e98 46550->46551 46553 402ea9 46550->46553 46554 402eae 46550->46554 46556 403445 28 API calls 46551->46556 46553->46193 46554->46553 46557 40225b 11 API calls 46554->46557 46556->46553 46557->46553 46559 404bd0 46558->46559 46562 40245c 46559->46562 46561 404be4 46561->46196 46563 402469 46562->46563 46565 402478 46563->46565 46566 402ad3 28 API calls 46563->46566 46565->46561 46566->46565 46567->46200 46569 401e94 46568->46569 46571 41a471 46570->46571 46572 41b168 GetCurrentProcess 46570->46572 46573 412513 RegOpenKeyExA 46571->46573 46572->46571 46574 412541 RegQueryValueExA RegCloseKey 46573->46574 46575 412569 46573->46575 46574->46575 46576 401f66 28 API calls 46575->46576 46577 41257e 46576->46577 46577->46213 46578->46221 46580 40b02f 46579->46580 46583 40b04b 46580->46583 46582 40b045 46582->46232 46584 40b055 46583->46584 46586 40b060 46584->46586 46587 40b138 28 API calls 46584->46587 46586->46582 46587->46586 46588->46236 46589->46238 46591 40230d 46590->46591 46592 402325 28 API calls 46591->46592 46593 401f80 46592->46593 46593->45966 46610 43a545 46594->46610 46596 43998b 46616 4392de 35 API calls 2 library calls 46596->46616 46598 439950 46598->46596 46599 439965 46598->46599 46601 43996a _strftime 46598->46601 46615 445354 20 API calls __dosmaperr 46599->46615 46601->46264 46603 439997 46605 4399c6 46603->46605 46617 43a58a 39 API calls __Toupper 46603->46617 46604 439a32 46619 43a4f1 20 API calls 2 library calls 46604->46619 46605->46604 46618 43a4f1 20 API calls 2 library calls 46605->46618 46608 439af9 _swprintf 46608->46601 46620 445354 20 API calls __dosmaperr 46608->46620 46611 43a54a 46610->46611 46612 43a55d 46610->46612 46621 445354 20 API calls __dosmaperr 46611->46621 46612->46598 46614 43a54f _strftime 46614->46598 46615->46601 46616->46603 46617->46603 46618->46604 46619->46608 46620->46601 46621->46614 46626 401e9b 46622->46626 46624 4027d9 46624->46277 46625->46281 46627 401ea7 46626->46627 46628 40245c 28 API calls 46627->46628 46629 401eb9 46628->46629 46629->46624 46631 409855 46630->46631 46632 4124b7 3 API calls 46631->46632 46633 40985c 46632->46633 46634 409870 46633->46634 46635 40988a 46633->46635 46636 4095cf 46634->46636 46637 409875 46634->46637 46638 4082dc 28 API calls 46635->46638 46636->46017 46649 4082dc 46637->46649 46640 409898 46638->46640 46654 4098a5 85 API calls 46640->46654 46644 409888 46644->46636 46645->46306 46663 402d8b 46646->46663 46648 4028dd 46648->46309 46650 4082eb 46649->46650 46655 408431 46650->46655 46652 408309 46653 409959 29 API calls 46652->46653 46653->46644 46660 40999f 129 API calls 46653->46660 46654->46636 46661 4099b5 52 API calls 46654->46661 46662 4099a9 124 API calls 46654->46662 46656 40843d 46655->46656 46658 40845b 46656->46658 46659 402f0d 28 API calls 46656->46659 46658->46652 46659->46658 46664 402d97 46663->46664 46667 4030f7 46664->46667 46666 402dab 46666->46648 46668 403101 46667->46668 46670 403115 46668->46670 46671 4036c2 28 API calls 46668->46671 46670->46666 46671->46670 46673 403b48 46672->46673 46679 403b7a 46673->46679 46676 403cbb 46688 403dc2 46676->46688 46678 403cc9 46678->46318 46680 403b86 46679->46680 46683 403b9e 46680->46683 46682 403b5a 46682->46676 46684 403ba8 46683->46684 46686 403bb3 46684->46686 46687 403cfd 28 API calls 46684->46687 46686->46682 46687->46686 46689 403dce 46688->46689 46692 402ffd 46689->46692 46691 403de3 46691->46678 46693 40300e 46692->46693 46694 4032a4 22 API calls 46693->46694 46695 40301a 46694->46695 46697 40302e 46695->46697 46698 4035e8 28 API calls 46695->46698 46697->46691 46698->46697 46705 4395ba 46699->46705 46703 412814 46702->46703 46704 4127ed RegSetValueExA RegCloseKey 46702->46704 46703->46344 46704->46703 46708 43953b 46705->46708 46707 401608 46707->46342 46709 43954a 46708->46709 46710 43955e 46708->46710 46714 445354 20 API calls __dosmaperr 46709->46714 46713 43954f __alldvrm _strftime 46710->46713 46715 447601 11 API calls 2 library calls 46710->46715 46713->46707 46714->46713 46715->46713 46719 41aab9 _Yarn ___scrt_fastfail 46716->46719 46717 401f66 28 API calls 46718 41ab2e 46717->46718 46718->46348 46719->46717 46720->46364 46722 413fb3 WSASetLastError 46721->46722 46723 413fa9 46721->46723 46722->46428 46867 413e37 29 API calls ___std_exception_copy 46723->46867 46725 413fae 46725->46722 46728 404206 socket 46727->46728 46729 4041fd 46727->46729 46731 404220 46728->46731 46732 404224 CreateEventW 46728->46732 46868 404262 WSAStartup 46729->46868 46731->46428 46732->46428 46733 404202 46733->46728 46733->46731 46735 4049b1 46734->46735 46736 40492a 46734->46736 46735->46428 46737 404933 46736->46737 46738 404987 CreateEventA CreateThread 46736->46738 46739 404942 GetLocalTime 46736->46739 46737->46738 46738->46735 46870 404b1d 46738->46870 46740 41ad46 28 API calls 46739->46740 46741 40495b 46740->46741 46869 404c9e 28 API calls 46741->46869 46743 404968 46744 401f66 28 API calls 46743->46744 46745 404977 46744->46745 46746 41a686 79 API calls 46745->46746 46747 40497c 46746->46747 46748 401eea 11 API calls 46747->46748 46748->46738 46750 4043e1 46749->46750 46751 4042b3 46749->46751 46752 4043e7 WSAGetLastError 46750->46752 46803 404343 46750->46803 46753 4042e8 46751->46753 46755 404cbf 28 API calls 46751->46755 46751->46803 46754 4043f7 46752->46754 46752->46803 46874 420151 27 API calls 46753->46874 46756 4042f7 46754->46756 46757 4043fc 46754->46757 46759 4042d4 46755->46759 46762 401f66 28 API calls 46756->46762 46879 41bc76 30 API calls 46757->46879 46763 401f66 28 API calls 46759->46763 46761 4042f0 46761->46756 46765 404306 46761->46765 46766 404448 46762->46766 46767 4042e3 46763->46767 46764 40440b 46880 404c9e 28 API calls 46764->46880 46774 404315 46765->46774 46775 40434c 46765->46775 46769 401f66 28 API calls 46766->46769 46770 41a686 79 API calls 46767->46770 46772 404457 46769->46772 46770->46753 46771 404418 46773 401f66 28 API calls 46771->46773 46777 41a686 79 API calls 46772->46777 46778 404427 46773->46778 46776 401f66 28 API calls 46774->46776 46876 420f34 54 API calls 46775->46876 46780 404324 46776->46780 46777->46803 46781 41a686 79 API calls 46778->46781 46783 401f66 28 API calls 46780->46783 46784 40442c 46781->46784 46782 404354 46785 404389 46782->46785 46786 404359 46782->46786 46787 404333 46783->46787 46789 401eea 11 API calls 46784->46789 46878 4202ea 28 API calls 46785->46878 46790 401f66 28 API calls 46786->46790 46791 41a686 79 API calls 46787->46791 46789->46803 46792 404368 46790->46792 46793 404338 46791->46793 46796 401f66 28 API calls 46792->46796 46875 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46793->46875 46794 404391 46795 4043be CreateEventW CreateEventW 46794->46795 46798 401f66 28 API calls 46794->46798 46795->46803 46797 404377 46796->46797 46799 41a686 79 API calls 46797->46799 46801 4043a7 46798->46801 46802 40437c 46799->46802 46804 401f66 28 API calls 46801->46804 46877 420592 52 API calls 46802->46877 46803->46428 46806 4043b6 46804->46806 46807 41a686 79 API calls 46806->46807 46808 4043bb 46807->46808 46808->46795 46881 41a945 GlobalMemoryStatusEx 46809->46881 46811 41a982 46811->46428 46882 413646 46812->46882 46816 440c5d 46815->46816 46912 440a4d 46816->46912 46818 440c7e 46818->46428 46820 40cc0d 46819->46820 46821 41246e 3 API calls 46820->46821 46823 40cc14 46821->46823 46822 40cc2c 46822->46428 46823->46822 46824 4124b7 3 API calls 46823->46824 46824->46822 46826 401f86 28 API calls 46825->46826 46827 41ae03 46826->46827 46827->46428 46829 440c51 20 API calls 46828->46829 46830 41ad67 46829->46830 46831 401f66 28 API calls 46830->46831 46832 41ad75 46831->46832 46832->46428 46834 41acb6 GetTickCount 46833->46834 46834->46428 46836 436050 ___scrt_fastfail 46835->46836 46837 41ac71 GetForegroundWindow GetWindowTextW 46836->46837 46838 403b40 28 API calls 46837->46838 46839 41ac9b 46838->46839 46839->46428 46841 401f66 28 API calls 46840->46841 46842 40e69e 46841->46842 46842->46428 46844 4027f8 46843->46844 46845 402e78 28 API calls 46844->46845 46846 402814 46845->46846 46846->46428 46854 4045ec 46847->46854 46848 43a88c ___std_exception_copy 21 API calls 46848->46854 46850 401f86 28 API calls 46850->46854 46851 404666 46934 4047eb 98 API calls 46851->46934 46852 401eef 11 API calls 46852->46854 46854->46848 46854->46850 46854->46851 46854->46852 46855 401eea 11 API calls 46854->46855 46917 40455b 46854->46917 46923 404688 46854->46923 46855->46854 46856 40466d 46857 401eea 11 API calls 46856->46857 46858 404676 46857->46858 46859 401eea 11 API calls 46858->46859 46860 40467f 46859->46860 46860->46428 46862->46428 46863->46392 46864->46392 46865->46392 46866->46392 46867->46725 46868->46733 46869->46743 46873 404b29 101 API calls 46870->46873 46872 404b26 46873->46872 46874->46761 46875->46803 46876->46782 46877->46793 46878->46794 46879->46764 46880->46771 46881->46811 46885 413619 46882->46885 46886 41362e ___scrt_initialize_default_local_stdio_options 46885->46886 46889 43e2dd 46886->46889 46892 43b030 46889->46892 46893 43b070 46892->46893 46894 43b058 46892->46894 46893->46894 46895 43b078 46893->46895 46907 445354 20 API calls __dosmaperr 46894->46907 46908 4392de 35 API calls 2 library calls 46895->46908 46898 43b05d _strftime 46901 433d2c CatchGuardHandler 5 API calls 46898->46901 46899 43b088 46909 43b7b6 20 API calls 2 library calls 46899->46909 46902 41363c 46901->46902 46902->46428 46903 43b100 46910 43be24 50 API calls 3 library calls 46903->46910 46906 43b10b 46911 43b820 20 API calls _free 46906->46911 46907->46898 46908->46899 46909->46903 46910->46906 46911->46898 46913 440a64 46912->46913 46915 440a9b _strftime 46913->46915 46916 445354 20 API calls __dosmaperr 46913->46916 46915->46818 46916->46915 46918 404592 recv 46917->46918 46919 404565 WaitForSingleObject 46917->46919 46921 4045a5 46918->46921 46935 420556 54 API calls 46919->46935 46921->46854 46922 404581 SetEvent 46922->46921 46933 4046a3 46923->46933 46924 4047d8 46925 401eea 11 API calls 46924->46925 46926 4047e1 46925->46926 46926->46854 46927 403b60 28 API calls 46927->46933 46928 401eef 11 API calls 46928->46933 46929 401eea 11 API calls 46929->46933 46930 401fbd 28 API calls 46930->46933 46931 401ebd 28 API calls 46932 404772 CreateEventA CreateThread WaitForSingleObject CloseHandle 46931->46932 46932->46933 46936 414b9b 46932->46936 46933->46924 46933->46927 46933->46928 46933->46929 46933->46930 46933->46931 46934->46856 46935->46922 46937 401fbd 28 API calls 46936->46937 46938 414bbd SetEvent 46937->46938 46939 414bd2 46938->46939 46940 403b60 28 API calls 46939->46940 46941 414bec 46940->46941 46942 401fbd 28 API calls 46941->46942 46943 414bfc 46942->46943 46944 401fbd 28 API calls 46943->46944 46945 414c0e 46944->46945 46946 41afc3 28 API calls 46945->46946 46947 414c17 46946->46947 46949 414d99 46947->46949 46950 414c37 GetTickCount 46947->46950 47012 414d8a 46947->47012 46948 401d8c 11 API calls 46951 4161fb 46948->46951 46949->47012 47013 414dad 46949->47013 46952 41ad46 28 API calls 46950->46952 46953 401eea 11 API calls 46951->46953 46954 414c4d 46952->46954 46956 416207 46953->46956 46957 41aca0 GetTickCount 46954->46957 46958 401eea 11 API calls 46956->46958 46959 414c54 46957->46959 46960 416213 46958->46960 46961 41ad46 28 API calls 46959->46961 46962 414c5f 46961->46962 46963 41ac52 30 API calls 46962->46963 46964 414c6d 46963->46964 47015 41aec8 46964->47015 46967 401d64 28 API calls 46968 414c89 46967->46968 46969 4027ec 28 API calls 46968->46969 46970 414c97 46969->46970 47019 40275c 46970->47019 46972 414ca6 46973 4027cb 28 API calls 46972->46973 46974 414cb5 46973->46974 46975 40275c 28 API calls 46974->46975 46976 414cc4 46975->46976 46977 4027cb 28 API calls 46976->46977 46978 414cd0 46977->46978 46979 40275c 28 API calls 46978->46979 46980 414cda 46979->46980 46981 404468 61 API calls 46980->46981 46982 414ce9 46981->46982 46983 401eea 11 API calls 46982->46983 46984 414cf2 46983->46984 46985 401eea 11 API calls 46984->46985 46986 414cfe 46985->46986 46987 401eea 11 API calls 46986->46987 46988 414d0a 46987->46988 46989 401eea 11 API calls 46988->46989 46990 414d16 46989->46990 46991 401eea 11 API calls 46990->46991 46992 414d22 46991->46992 46993 401eea 11 API calls 46992->46993 46994 414d2e 46993->46994 46995 401e13 11 API calls 46994->46995 46996 414d3a 46995->46996 46997 401eea 11 API calls 46996->46997 46998 414d43 46997->46998 46999 401eea 11 API calls 46998->46999 47000 414d4c 46999->47000 47001 401d64 28 API calls 47000->47001 47002 414d57 47001->47002 47003 43a5e7 39 API calls 47002->47003 47004 414d64 47003->47004 47005 414d69 47004->47005 47006 414d8f 47004->47006 47008 414d82 47005->47008 47009 414d77 47005->47009 47007 401d64 28 API calls 47006->47007 47007->46949 47010 404915 104 API calls 47008->47010 47026 4049ba 81 API calls 47009->47026 47010->47012 47012->46948 47027 404ab1 83 API calls 47013->47027 47014 414d7d 47014->47012 47016 41aed5 47015->47016 47017 401f86 28 API calls 47016->47017 47018 414c7b 47017->47018 47018->46967 47023 40276b 47019->47023 47020 4027ad 47021 401e9b 28 API calls 47020->47021 47022 4027ab 47021->47022 47022->46972 47023->47020 47024 4027a2 47023->47024 47028 402ee5 28 API calls 47024->47028 47026->47014 47027->47014 47028->47022 47030->46456 47031->46484 47032->46483 47033->46472 47034->46476 47035->46482 47038 40e56a 47036->47038 47037 4124b7 3 API calls 47037->47038 47038->47037 47040 40e60e 47038->47040 47042 40e5fe Sleep 47038->47042 47059 40e59c 47038->47059 47039 4082dc 28 API calls 47039->47059 47041 4082dc 28 API calls 47040->47041 47044 40e619 47041->47044 47042->47038 47043 41ae08 28 API calls 47043->47059 47046 41ae08 28 API calls 47044->47046 47047 40e625 47046->47047 47071 412774 14 API calls 47047->47071 47050 401e13 11 API calls 47050->47059 47051 40e638 47052 401e13 11 API calls 47051->47052 47054 40e644 47052->47054 47053 401f66 28 API calls 47053->47059 47055 401f66 28 API calls 47054->47055 47056 40e655 47055->47056 47058 4126d2 14 API calls 47056->47058 47057 4126d2 14 API calls 47057->47059 47060 40e668 47058->47060 47059->47039 47059->47042 47059->47043 47059->47050 47059->47053 47059->47057 47069 40bf04 73 API calls ___scrt_fastfail 47059->47069 47070 412774 14 API calls 47059->47070 47072 411699 TerminateProcess WaitForSingleObject 47060->47072 47062 40e670 ExitProcess 47073 411637 62 API calls 47063->47073 47070->47059 47071->47051 47072->47062

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                                                    • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                                                    • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                                                    • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                                                    • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                                                    • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                                                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                                                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                    • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                                                                                    • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                                                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                                                                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleLibraryLoadModule
                                                                                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                    • API String ID: 384173800-625181639
                                                                                    • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                    • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                                                                    • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                    • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                      • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                      • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                    • Sleep.KERNEL32(00000BB8), ref: 0040E603
                                                                                    • ExitProcess.KERNEL32 ref: 0040E672
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                    • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                                                                    • API String ID: 2281282204-3981147832
                                                                                    • Opcode ID: dc5cd3b950707be250f4626283970aa53dc17a48cc22471f6a110bb8d9872840
                                                                                    • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                                                                    • Opcode Fuzzy Hash: dc5cd3b950707be250f4626283970aa53dc17a48cc22471f6a110bb8d9872840
                                                                                    • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1239 404915-404924 1240 4049b1 1239->1240 1241 40492a-404931 1239->1241 1242 4049b3-4049b7 1240->1242 1243 404933-404937 1241->1243 1244 404939-404940 1241->1244 1245 404987-4049af CreateEventA CreateThread 1243->1245 1244->1245 1246 404942-404982 GetLocalTime call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1244->1246 1245->1242 1246->1245
                                                                                    APIs
                                                                                    • GetLocalTime.KERNEL32(00000001,00473EE8,004745A8,00000000,?,?,?,?,?,00414D8A,?,00000001), ref: 00404946
                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00473EE8,004745A8,00000000,?,?,?,?,?,00414D8A,?,00000001), ref: 00404994
                                                                                    • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                                                                    Strings
                                                                                    • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Create$EventLocalThreadTime
                                                                                    • String ID: KeepAlive | Enabled | Timeout:
                                                                                    • API String ID: 2532271599-1507639952
                                                                                    • Opcode ID: 7afe2cb509bd7313b07bcd96579ec33f9e0ffdb7d4c327f789e20c38aeff2894
                                                                                    • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                                                                    • Opcode Fuzzy Hash: 7afe2cb509bd7313b07bcd96579ec33f9e0ffdb7d4c327f789e20c38aeff2894
                                                                                    • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                    • SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                                    • recv.WS2_32(?,?,?,00000000), ref: 0040459F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: EventObjectSingleWaitrecv
                                                                                    • String ID:
                                                                                    • API String ID: 311754179-0
                                                                                    • Opcode ID: f607482e4343822148b028568a10a35340e8017a1e546fdda455ad4df8589c88
                                                                                    • Instruction ID: 26c9fa113e50de76ad78d978a7fe27ea9b76c3f20528cd6e12f8aa4c3c3b2b63
                                                                                    • Opcode Fuzzy Hash: f607482e4343822148b028568a10a35340e8017a1e546fdda455ad4df8589c88
                                                                                    • Instruction Fuzzy Hash: 3FF08236108212BFD7018B14FC08E1AFBA2FB88721F10863AF614522A19771EC20DB59
                                                                                    APIs
                                                                                    • GetComputerNameExW.KERNEL32(00000001,?,0000002B,00474358), ref: 0041A7BF
                                                                                    • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Name$ComputerUser
                                                                                    • String ID:
                                                                                    • API String ID: 4229901323-0
                                                                                    • Opcode ID: cde94d6ab6d559736168707b99f603480b027a4e5b0d27f6afb59f5a93c8ae6f
                                                                                    • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                                                                    • Opcode Fuzzy Hash: cde94d6ab6d559736168707b99f603480b027a4e5b0d27f6afb59f5a93c8ae6f
                                                                                    • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                                                                                    APIs
                                                                                    • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 2299586839-0
                                                                                    • Opcode ID: cfd0bc145c26702e1739b42b90775f026f17fa5d8f36fb20b32d05d25c771de3
                                                                                    • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                                                                    • Opcode Fuzzy Hash: cfd0bc145c26702e1739b42b90775f026f17fa5d8f36fb20b32d05d25c771de3
                                                                                    • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 5 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c call 43e820 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 49 40dc96-40dca7 call 401eea 23->49 79 40d9a5-40d9ac call 40bed7 69->79 80 40d96d-40d98c call 401e8f call 4124b7 69->80 70->69 100 40e134-40e154 call 401e8f call 412902 call 4112b5 70->100 88 40d9b5-40d9bc 79->88 89 40d9ae-40d9b0 79->89 80->79 99 40d98e-40d9a4 call 401e8f call 412902 80->99 93 40d9c0-40d9cc call 41a463 88->93 94 40d9be 88->94 92 40dc95 89->92 92->49 103 40d9d5-40d9d9 93->103 104 40d9ce-40d9d0 93->104 94->93 99->79 108 40da18-40da2b call 401d64 call 401e8f 103->108 109 40d9db call 40697b 103->109 104->103 127 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 108->127 128 40da2d call 4069ba 108->128 117 40d9e0-40d9e2 109->117 120 40d9e4-40d9e9 call 40699d call 4064d0 117->120 121 40d9ee-40da01 call 401d64 call 401e8f 117->121 120->121 121->108 138 40da03-40da09 121->138 163 40db22-40db26 127->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a611 127->164 128->127 138->108 140 40da0b-40da11 138->140 140->108 142 40da13 call 4064d0 140->142 142->108 165 40dcaa-40dd01 call 436050 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->165 166 40db2c-40db33 163->166 164->163 189 40dad7-40db1d call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->189 220 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5e7 165->220 169 40dbb1-40dbbb call 4082d7 166->169 170 40db35-40dbaf call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 166->170 179 40dbc0-40dbe4 call 4022f8 call 4338c8 169->179 170->179 197 40dbf3 179->197 198 40dbe6-40dbf1 call 436050 179->198 189->163 203 40dbf5-40dc40 call 401e07 call 43e349 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 197->203 198->203 258 40dc45-40dc6a call 4338d1 call 401d64 call 40b125 203->258 272 40dd79-40dd7b 220->272 273 40dd5e 220->273 258->220 274 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 258->274 276 40dd81 272->276 277 40dd7d-40dd7f 272->277 275 40dd60-40dd77 call 41beb0 CreateThread 273->275 274->220 292 40dc93 274->292 280 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43360d call 401d64 call 401e8f CreateThread 280->331 292->92 332 40dea3-40debb call 401d64 call 401e8f 330->332 331->332 342 40def9-40df0c call 401d64 call 401e8f 332->342 343 40debd-40def4 call 43360d call 401d64 call 401e8f CreateThread 332->343 353 40df6c-40df7f call 401d64 call 401e8f 342->353 354 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 342->354 343->342 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 40b95c 353->365 366 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 353->366 354->353 365->366 386 40dfe0-40dfe1 SetProcessDEPPolicy 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 395 40e019-40e020 390->395 396 40e00d-40e017 CreateThread 390->396 391->390 399 40e022-40e025 395->399 400 40e033-40e038 395->400 396->395 401 40e073-40e08e call 401e8f call 41246e 399->401 402 40e027-40e031 399->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 400->404 413 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 401->413 414 40e12a-40e12f call 40cbac call 413fd4 401->414 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 413->433 414->100 434 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->414 435->434 437 40e0db-40e0e8 Sleep call 401e07 435->437 437->433
                                                                                    APIs
                                                                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\eBHn6qHPLz.exe,00000104), ref: 0040D790
                                                                                      • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                    • String ID: (CG$(CG$0DG$@CG$@CG$Access Level: $Administrator$C:\Users\user\Desktop\eBHn6qHPLz.exe$Exe$Inj$Remcos Agent initialized$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                                                                                    • API String ID: 2830904901-2348321754
                                                                                    • Opcode ID: f3c1f04b04a767db0e35eebb8fa2663d2a32b522b71fdc049a56bd90a94451e7
                                                                                    • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                                                                                    • Opcode Fuzzy Hash: f3c1f04b04a767db0e35eebb8fa2663d2a32b522b71fdc049a56bd90a94451e7
                                                                                    • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 447 413fd4-41401f call 401faa call 41aa73 call 401faa call 401d64 call 401e8f call 43a5e7 460 414021-414028 Sleep 447->460 461 41402e-41407c call 401f66 call 401d64 call 401fbd call 41afc3 call 404262 call 401d64 call 40b125 447->461 460->461 476 4140f0-41418a call 401f66 call 401d64 call 401fbd call 41afc3 call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 461->476 477 41407e-4140ed call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 461->477 530 41419a-4141a1 476->530 531 41418c-414198 476->531 477->476 532 4141a6-414242 call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 413f9a 530->532 531->532 559 414244-41428a WSAGetLastError call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 532->559 560 41428f-41429d call 4041f1 532->560 583 414b54-414b66 call 4047eb call 4020b4 559->583 566 4142ca-4142df call 404915 call 40428c 560->566 567 41429f-4142c5 call 401f66 * 2 call 41a686 560->567 582 4142e5-414432 call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 4 call 41a96d call 413683 call 4082dc call 440c51 call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 41265d 566->582 566->583 567->583 647 414434-414441 call 40541d 582->647 648 414446-41446d call 401e8f call 412513 582->648 595 414b68-414b88 call 401d64 call 401e8f call 43a5e7 Sleep 583->595 596 414b8e-414b96 call 401d8c 583->596 595->596 596->476 647->648 654 414474-414abb call 403b40 call 40cbf1 call 41adee call 41aec8 call 41ad46 call 401d64 GetTickCount call 41ad46 call 41aca0 call 41ad46 * 2 call 41ac52 call 41aec8 * 5 call 40e679 call 41aec8 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 404468 call 401eea * 50 call 401e13 call 401eea * 6 call 401e13 call 4045d5 648->654 655 41446f-414471 648->655 900 414ac0-414ac7 654->900 655->654 901 414ac9-414ad0 900->901 902 414adb-414ae2 900->902 901->902 903 414ad2-414ad4 901->903 904 414ae4-414ae9 call 40a767 902->904 905 414aee-414b20 call 405415 call 401f66 * 2 call 41a686 902->905 903->902 904->905 916 414b22-414b2e CreateThread 905->916 917 414b34-414b4f call 401eea * 2 call 401e13 905->917 916->917 917->583
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(00000000,00000029,004742F8,?,00000000), ref: 00414028
                                                                                    • WSAGetLastError.WS2_32 ref: 00414249
                                                                                    • Sleep.KERNEL32(00000000,00000002), ref: 00414B88
                                                                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Sleep$ErrorLastLocalTime
                                                                                    • String ID: | $%I64u$5.3.0 Pro$@CG$C:\Users\user\Desktop\eBHn6qHPLz.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$TLS Off$TLS On $XCG$XCG$XCG$`=G$dCG$hlight$name$>G$>G$BG
                                                                                    • API String ID: 524882891-3927341145
                                                                                    • Opcode ID: 90738c15178e6b2c3cf09a24418f5a3979737b1d8fd61352a783ebcb98d8eabf
                                                                                    • Instruction ID: a0bb0b13232d9f5991351636829aab2dda2428bc81dc0b9639db3628de0ead2f
                                                                                    • Opcode Fuzzy Hash: 90738c15178e6b2c3cf09a24418f5a3979737b1d8fd61352a783ebcb98d8eabf
                                                                                    • Instruction Fuzzy Hash: 58524E31A001145ADB18F771DDA6AEE73A59F90708F1041BFB80A771E2EF385E85CA9D

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • connect.WS2_32(?,?,?), ref: 004042A5
                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                                                    • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                    • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                    • API String ID: 994465650-2151626615
                                                                                    • Opcode ID: 734f2c86b38baede886f9d355fa5f2a7634604b986bf68e30e9a87a767840647
                                                                                    • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                                                                    • Opcode Fuzzy Hash: 734f2c86b38baede886f9d355fa5f2a7634604b986bf68e30e9a87a767840647
                                                                                    • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 999 40c89e-40c8c3 call 401e52 1002 40c8c9 999->1002 1003 40c9ed-40ca13 call 401e07 GetLongPathNameW call 403b40 999->1003 1004 40c8d0-40c8d5 1002->1004 1005 40c9c2-40c9c7 1002->1005 1006 40c905-40c90a 1002->1006 1007 40c9d8 1002->1007 1008 40c9c9-40c9ce call 43ac0f 1002->1008 1009 40c8da-40c8e8 call 41a74b call 401e18 1002->1009 1010 40c8fb-40c900 1002->1010 1011 40c9bb-40c9c0 1002->1011 1012 40c90f-40c916 call 41b15b 1002->1012 1027 40ca18-40ca85 call 403b40 call 40cc37 call 402860 * 2 call 401e13 * 5 1003->1027 1015 40c9dd-40c9e2 call 43ac0f 1004->1015 1005->1015 1006->1015 1007->1015 1019 40c9d3-40c9d6 1008->1019 1031 40c8ed 1009->1031 1010->1015 1011->1015 1028 40c918-40c968 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1012->1028 1029 40c96a-40c9b6 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1012->1029 1024 40c9e3-40c9e8 call 4082d7 1015->1024 1019->1007 1019->1024 1024->1003 1037 40c8f1-40c8f6 call 401e13 1028->1037 1029->1031 1031->1037 1037->1003
                                                                                    APIs
                                                                                    • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LongNamePath
                                                                                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                    • API String ID: 82841172-425784914
                                                                                    • Opcode ID: a9c7120ea0ae85f4d8bb92ab4d668114329b205a5d777d04df1454f3d5f9280f
                                                                                    • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                                                                    • Opcode Fuzzy Hash: a9c7120ea0ae85f4d8bb92ab4d668114329b205a5d777d04df1454f3d5f9280f
                                                                                    • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                                                                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                                                                                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                                                                                    Strings
                                                                                    • http://geoplugin.net/json.gp, xrefs: 0041A54E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Internet$CloseHandleOpen$FileRead
                                                                                    • String ID: http://geoplugin.net/json.gp
                                                                                    • API String ID: 3121278467-91888290
                                                                                    • Opcode ID: 93c68c68fd3eadee9dae1c4fcccce0b07dd9aa7f001bde451803d805c4740930
                                                                                    • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                                                                    • Opcode Fuzzy Hash: 93c68c68fd3eadee9dae1c4fcccce0b07dd9aa7f001bde451803d805c4740930
                                                                                    • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                      • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                      • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                      • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                    • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCurrentOpenProcessQueryValue
                                                                                    • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                    • API String ID: 1866151309-2070987746
                                                                                    • Opcode ID: 2ecf56d5918bcf6aac5f64e6b65e876b3c5a7effbb40a179cf39785145a79331
                                                                                    • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                                                                    • Opcode Fuzzy Hash: 2ecf56d5918bcf6aac5f64e6b65e876b3c5a7effbb40a179cf39785145a79331
                                                                                    • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1170 4126d2-4126e9 RegCreateKeyA 1171 412722 1170->1171 1172 4126eb-412720 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1170->1172 1173 412724-412730 call 401eea 1171->1173 1172->1173
                                                                                    APIs
                                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                    • RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                    • RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateValue
                                                                                    • String ID: HgF$pth_unenc
                                                                                    • API String ID: 1818849710-3662775637
                                                                                    • Opcode ID: 71eb531204d8fd0b136a499f7559ae8f43f87fb45ec2430c7633c83b17c543f2
                                                                                    • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                                                                    • Opcode Fuzzy Hash: 71eb531204d8fd0b136a499f7559ae8f43f87fb45ec2430c7633c83b17c543f2
                                                                                    • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1180 446f43-446f5a GetLastError 1181 446f5c-446f66 call 447466 1180->1181 1182 446f68-446f6f call 448706 1180->1182 1181->1182 1187 446fb9-446fc0 SetLastError 1181->1187 1186 446f74-446f7a 1182->1186 1188 446f85-446f93 call 4474bc 1186->1188 1189 446f7c 1186->1189 1190 446fc2-446fc7 1187->1190 1196 446f95-446f96 1188->1196 1197 446f98-446fae call 446d31 call 446ac5 1188->1197 1191 446f7d-446f83 call 446ac5 1189->1191 1199 446fb0-446fb7 SetLastError 1191->1199 1196->1191 1197->1187 1197->1199 1199->1190
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,?,?,00445359,00446B42,00000000,?,00433627,?,?,00402BE9,?,00402629,00000000,?,00402578), ref: 00446F48
                                                                                    • _free.LIBCMT ref: 00446F7D
                                                                                    • _free.LIBCMT ref: 00446FA4
                                                                                    • SetLastError.KERNEL32(00000000), ref: 00446FB1
                                                                                    • SetLastError.KERNEL32(00000000), ref: 00446FBA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free
                                                                                    • String ID:
                                                                                    • API String ID: 3170660625-0
                                                                                    • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                                    • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                                                                                    • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                                    • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    • WaitForSingleObject.KERNEL32(?,00000000,LAL,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000), ref: 0040450E
                                                                                    • SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000,?,?,?,?,?,00414CE9), ref: 0040453C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: EventObjectSingleWaitsend
                                                                                    • String ID: LAL
                                                                                    • API String ID: 3963590051-3302426157
                                                                                    • Opcode ID: 41638b289ceb8eaf7cbd4cb7822ea1bc47615e740c9784d7124be241e8048e1d
                                                                                    • Instruction ID: 68c7e6670e460543dd9c105572fcb78fed3a06f13f8c8b410ea91b680b50408d
                                                                                    • Opcode Fuzzy Hash: 41638b289ceb8eaf7cbd4cb7822ea1bc47615e740c9784d7124be241e8048e1d
                                                                                    • Instruction Fuzzy Hash: 192143B29001196BDF04BBA5DC96DEE777CFF54358B00013EF916B21E1EA78A604D6A4

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1256 4127d5-4127eb RegCreateKeyA 1257 412818-41281b 1256->1257 1258 4127ed-412812 RegSetValueExA RegCloseKey 1256->1258 1258->1257 1259 412814-412817 1258->1259
                                                                                    APIs
                                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                    • RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateValue
                                                                                    • String ID: TUF
                                                                                    • API String ID: 1818849710-3431404234
                                                                                    • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                    • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                                                                    • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                    • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                                    • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                                    • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                    • String ID:
                                                                                    • API String ID: 3360349984-0
                                                                                    • Opcode ID: cb7f0feda4e4b52cce0be13b0d412b70144cf861664ac55189dbebc92e1ed578
                                                                                    • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                                                                    • Opcode Fuzzy Hash: cb7f0feda4e4b52cce0be13b0d412b70144cf861664ac55189dbebc92e1ed578
                                                                                    • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CountEventTick
                                                                                    • String ID: >G
                                                                                    • API String ID: 180926312-1296849874
                                                                                    • Opcode ID: 28d9132e1d098d05d0913582390d3a9cd3595bbbc3e86bcf3027074534a78104
                                                                                    • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                                                                    • Opcode Fuzzy Hash: 28d9132e1d098d05d0913582390d3a9cd3595bbbc3e86bcf3027074534a78104
                                                                                    • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                                                                    APIs
                                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                                                                    • GetLastError.KERNEL32 ref: 0040BEF1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateErrorLastMutex
                                                                                    • String ID: (CG
                                                                                    • API String ID: 1925916568-4210230975
                                                                                    • Opcode ID: 296d9643a91431cf214b808cae9b7d77365ac793ad5cac5481aac8ac9a10b333
                                                                                    • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                                                                    • Opcode Fuzzy Hash: 296d9643a91431cf214b808cae9b7d77365ac793ad5cac5481aac8ac9a10b333
                                                                                    • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919
                                                                                    APIs
                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                    • RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3677997916-0
                                                                                    • Opcode ID: 147e62fc4eb0db3fe2726599cc038d375497f210b40a1d92884617782f01b657
                                                                                    • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                                                                    • Opcode Fuzzy Hash: 147e62fc4eb0db3fe2726599cc038d375497f210b40a1d92884617782f01b657
                                                                                    • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8
                                                                                    APIs
                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                    • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                    • RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3677997916-0
                                                                                    • Opcode ID: e356916b1740155a69653a68473027dca2ca6835ab0d3846d735c0fff301d5eb
                                                                                    • Instruction ID: c18416eb0b1572374c3e2b3be0649ca89fc6f9e16ed4320a44d925c8ae57db2a
                                                                                    • Opcode Fuzzy Hash: e356916b1740155a69653a68473027dca2ca6835ab0d3846d735c0fff301d5eb
                                                                                    • Instruction Fuzzy Hash: BD018131404229FBDF216FA1DC45DDF7F78EF11754F004065BA04A21A1D7758AB5DBA8
                                                                                    APIs
                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                    • RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3677997916-0
                                                                                    • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                    • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                                                                    • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                    • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98
                                                                                    APIs
                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                                                                                    • RegCloseKey.KERNEL32(?,?,?,0040B996,004660E0), ref: 004124A4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3677997916-0
                                                                                    • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                    • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                                                                                    • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                    • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID: xAG
                                                                                    • API String ID: 176396367-2759412365
                                                                                    • Opcode ID: ff637472b7ef91eb79cf1c791d23dde74da6086b31a6c5428193f8d367aac764
                                                                                    • Instruction ID: 4b5f0267b16b6d1f94f05398eea60063c36f9fdec9e789d07f1c8464d26cb595
                                                                                    • Opcode Fuzzy Hash: ff637472b7ef91eb79cf1c791d23dde74da6086b31a6c5428193f8d367aac764
                                                                                    • Instruction Fuzzy Hash: 751193325002049FCB15FF66D8968EF7BA4EF64314B10453FF842622E2EF38A955CB98
                                                                                    APIs
                                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041A959
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: GlobalMemoryStatus
                                                                                    • String ID: @
                                                                                    • API String ID: 1890195054-2766056989
                                                                                    • Opcode ID: 6a5e85952f382d12afcc854e62baf2dc0b8e461fb7fe04101b075e185c2318ef
                                                                                    • Instruction ID: dd145fffdacd7bda74fa2c6e5abe56fe406d4b7e613986be5c07feff288e4f4e
                                                                                    • Opcode Fuzzy Hash: 6a5e85952f382d12afcc854e62baf2dc0b8e461fb7fe04101b075e185c2318ef
                                                                                    • Instruction Fuzzy Hash: EFD067B99013189FCB20DFA8E945A8DBBF8FB48214F004529E946E3344E774E945CB95
                                                                                    APIs
                                                                                    • socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                      • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateEventStartupsocket
                                                                                    • String ID:
                                                                                    • API String ID: 1953588214-0
                                                                                    • Opcode ID: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                    • Instruction ID: 6d5c4ce7eefecebe47fda3b025552a79fd8a61a73b62065855ea20d17e135052
                                                                                    • Opcode Fuzzy Hash: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                    • Instruction Fuzzy Hash: A20171B05087809ED7358F38B8456977FE0AB15314F044DAEF1D697BA1C3B5A481CB18
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32 ref: 0041AC74
                                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041AC87
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Window$ForegroundText
                                                                                    • String ID:
                                                                                    • API String ID: 29597999-0
                                                                                    • Opcode ID: 8a79a7386f37e374dce250e4fcdef39063f35a229190475e51bbbfed219b13a7
                                                                                    • Instruction ID: 3cf16c2a8257e52241c70e3f2477159e0ff99a2dafdd86ddfb3cfc0a4d760bbd
                                                                                    • Opcode Fuzzy Hash: 8a79a7386f37e374dce250e4fcdef39063f35a229190475e51bbbfed219b13a7
                                                                                    • Instruction Fuzzy Hash: 56E04875A0031467EB24A765AC4EFDA766C9704715F0000B9BA19D21C3E9B4EA04CBE4
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00446F74,00000001,00000364,?,00433627,?,?,00402BE9,?,00402629,00000000,?), ref: 00448747
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: c0e71c43265bb7a2ed883484c95d5de73dd4aa74b019aeb8b9faa22b7eb24aee
                                                                                    • Instruction ID: 09342868e9f2d6cc7f7b696f5049c05c0568eaa44df27644d65b9450949fa691
                                                                                    • Opcode Fuzzy Hash: c0e71c43265bb7a2ed883484c95d5de73dd4aa74b019aeb8b9faa22b7eb24aee
                                                                                    • Instruction Fuzzy Hash: 9CF0E93250412467BB216A369D55B5F7748AF427B0B34802BFC08EA691DF68DD4182ED
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433627,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B31
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 9bddc84dc8664baa6f7cbd2250fb2f50dd1e52b915d866c7822d6cfd0d1e4f3c
                                                                                    • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                                                                    • Opcode Fuzzy Hash: 9bddc84dc8664baa6f7cbd2250fb2f50dd1e52b915d866c7822d6cfd0d1e4f3c
                                                                                    • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                                                                    APIs
                                                                                    • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Startup
                                                                                    • String ID:
                                                                                    • API String ID: 724789610-0
                                                                                    • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                    • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                                                                                    • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                    • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                                                                                    APIs
                                                                                    • SetEvent.KERNEL32(?), ref: 00406F28
                                                                                    • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                                                                      • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B489
                                                                                      • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4BB
                                                                                      • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B50C
                                                                                      • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B561
                                                                                      • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B568
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                      • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                      • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                      • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                      • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                      • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,LAL,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000), ref: 0040450E
                                                                                      • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000,?,?,?,?,?,00414CE9), ref: 0040453C
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                                                                    • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                                                                    • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                                                                    • DeleteFileA.KERNEL32(?), ref: 004078CC
                                                                                      • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                                                                      • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                      • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                    • Sleep.KERNEL32(000007D0), ref: 00407976
                                                                                    • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                                                                      • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                                                                    • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                                                                    • API String ID: 2918587301-599666313
                                                                                    • Opcode ID: 8d8541d2a33e3c89bbf933c2c608a61bbddb6eb8db6777bbc5c50dea736508ce
                                                                                    • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                                                                                    • Opcode Fuzzy Hash: 8d8541d2a33e3c89bbf933c2c608a61bbddb6eb8db6777bbc5c50dea736508ce
                                                                                    • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 0040508E
                                                                                      • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                      • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    • __Init_thread_footer.LIBCMT ref: 004050CB
                                                                                    • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                                                                                    • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                                                                      • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                      • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                                    • Sleep.KERNEL32(0000012C,00000093), ref: 0040523F
                                                                                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                                      • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                                                                    • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                                                                    • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                                    • CloseHandle.KERNEL32 ref: 004053CD
                                                                                    • CloseHandle.KERNEL32 ref: 004053D5
                                                                                    • CloseHandle.KERNEL32 ref: 004053E7
                                                                                    • CloseHandle.KERNEL32 ref: 004053EF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                    • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                                                                                    • API String ID: 3815868655-81343324
                                                                                    • Opcode ID: 79967bfc4aa4619c495febc68c93d93b33d4945ca5ed5205978de87250bde58a
                                                                                    • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                                                                    • Opcode Fuzzy Hash: 79967bfc4aa4619c495febc68c93d93b33d4945ca5ed5205978de87250bde58a
                                                                                    • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                                                                    APIs
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                                                                      • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                      • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                      • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                                                                    • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                                                                      • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                      • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                      • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                                                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                                                    • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                                                                                    • API String ID: 65172268-860466531
                                                                                    • Opcode ID: 3ee961bcbe2c39a354091d38cefd8d038ebc8cf278d634c960d730d4a1525077
                                                                                    • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                                                                                    • Opcode Fuzzy Hash: 3ee961bcbe2c39a354091d38cefd8d038ebc8cf278d634c960d730d4a1525077
                                                                                    • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                                                                                    APIs
                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFile$FirstNext
                                                                                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                    • API String ID: 1164774033-3681987949
                                                                                    • Opcode ID: fc6c0b7ab5542bba23354dc605770a21c72cedb14aa92cc47f910eea2e7f42c3
                                                                                    • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                                                                    • Opcode Fuzzy Hash: fc6c0b7ab5542bba23354dc605770a21c72cedb14aa92cc47f910eea2e7f42c3
                                                                                    • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                                                                    APIs
                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$Close$File$FirstNext
                                                                                    • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                    • API String ID: 3527384056-432212279
                                                                                    • Opcode ID: 649013ad7d811e643e38d33afdae7e9af9d198706af8871665a9d2c8af564432
                                                                                    • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                                                                    • Opcode Fuzzy Hash: 649013ad7d811e643e38d33afdae7e9af9d198706af8871665a9d2c8af564432
                                                                                    • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                                                                    APIs
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                                                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                                                                      • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                      • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                      • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                                    • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                                                                    • API String ID: 726551946-3025026198
                                                                                    • Opcode ID: 5c797dd89e6fc16e2d06978e248cc89c691130e2c3771225b122ef6162e9866d
                                                                                    • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                                                                    • Opcode Fuzzy Hash: 5c797dd89e6fc16e2d06978e248cc89c691130e2c3771225b122ef6162e9866d
                                                                                    • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                                                                    APIs
                                                                                    • OpenClipboard.USER32 ref: 004159C7
                                                                                    • EmptyClipboard.USER32 ref: 004159D5
                                                                                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                                                                    • CloseClipboard.USER32 ref: 00415A5A
                                                                                    • OpenClipboard.USER32 ref: 00415A61
                                                                                    • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                    • CloseClipboard.USER32 ref: 00415A89
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                    • String ID:
                                                                                    • API String ID: 3520204547-0
                                                                                    • Opcode ID: c6b7e8718b00d146d15bca1097b71f20c4037b71fec767a04e5478efbc63a162
                                                                                    • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                                                                                    • Opcode Fuzzy Hash: c6b7e8718b00d146d15bca1097b71f20c4037b71fec767a04e5478efbc63a162
                                                                                    • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0$1$2$3$4$5$6$7
                                                                                    • API String ID: 0-3177665633
                                                                                    • Opcode ID: bd199c0bd57a27b066ce43a4c478cbe5f73eee41689ad3107217538c6fca8a81
                                                                                    • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                                                                    • Opcode Fuzzy Hash: bd199c0bd57a27b066ce43a4c478cbe5f73eee41689ad3107217538c6fca8a81
                                                                                    • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32 ref: 00409B3F
                                                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                    • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                    • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                    • GetKeyboardState.USER32(?), ref: 00409B67
                                                                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                    • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                    • String ID: 8[G
                                                                                    • API String ID: 1888522110-1691237782
                                                                                    • Opcode ID: 3e4cd20e139c82d1a9a354c0cd804b45f3e7cb2135d7d20bc0d0fffe1111d1b9
                                                                                    • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                                                                    • Opcode Fuzzy Hash: 3e4cd20e139c82d1a9a354c0cd804b45f3e7cb2135d7d20bc0d0fffe1111d1b9
                                                                                    • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 00406788
                                                                                    • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Object_wcslen
                                                                                    • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                    • API String ID: 240030777-3166923314
                                                                                    • Opcode ID: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                                                    • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                                                                    • Opcode Fuzzy Hash: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                                                    • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                                                                    APIs
                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                                                                    • GetLastError.KERNEL32 ref: 00419935
                                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                    • String ID:
                                                                                    • API String ID: 3587775597-0
                                                                                    • Opcode ID: aa171504a469903125c5aced0f136fa6d8287bc29fc722de82985c10da00967e
                                                                                    • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                                                                    • Opcode Fuzzy Hash: aa171504a469903125c5aced0f136fa6d8287bc29fc722de82985c10da00967e
                                                                                    • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B489
                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4BB
                                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B529
                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B536
                                                                                      • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B50C
                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B561
                                                                                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B568
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,004742E0,004742F8), ref: 0041B570
                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B583
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                    • String ID:
                                                                                    • API String ID: 2341273852-0
                                                                                    • Opcode ID: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                                                    • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                                                                    • Opcode Fuzzy Hash: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                                                    • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                                                                                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                                                                      • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$Find$CreateFirstNext
                                                                                    • String ID: @CG$XCG$`HG$`HG$>G
                                                                                    • API String ID: 341183262-3780268858
                                                                                    • Opcode ID: c614d3856bcfda57053a8bc0be1be37a6a8de6d1f161e6c3e2b2508c006b566c
                                                                                    • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                                                                                    • Opcode Fuzzy Hash: c614d3856bcfda57053a8bc0be1be37a6a8de6d1f161e6c3e2b2508c006b566c
                                                                                    • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                                    • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                                    • GetLastError.KERNEL32 ref: 00409A1B
                                                                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                                    • TranslateMessage.USER32(?), ref: 00409A7A
                                                                                    • DispatchMessageA.USER32(?), ref: 00409A85
                                                                                    Strings
                                                                                    • Keylogger initialization failure: error , xrefs: 00409A32
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                    • String ID: Keylogger initialization failure: error
                                                                                    • API String ID: 3219506041-952744263
                                                                                    • Opcode ID: f3fc2e9871d206969271af9389460b7d2ce8e795877e75539e5a702fe98d6824
                                                                                    • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                                                                    • Opcode Fuzzy Hash: f3fc2e9871d206969271af9389460b7d2ce8e795877e75539e5a702fe98d6824
                                                                                    • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB
                                                                                    APIs
                                                                                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041301A
                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 00413026
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                    • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                    • API String ID: 2127411465-314212984
                                                                                    • Opcode ID: bb85e0d833c61f65b1e6c02350b98fa067da80fe6287452d9c1d184597ef7152
                                                                                    • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                                                                                    • Opcode Fuzzy Hash: bb85e0d833c61f65b1e6c02350b98fa067da80fe6287452d9c1d184597ef7152
                                                                                    • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                                                                    APIs
                                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                                                    • GetLastError.KERNEL32 ref: 0040B261
                                                                                    Strings
                                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                                                    • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                                                    • UserProfile, xrefs: 0040B227
                                                                                    • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DeleteErrorFileLast
                                                                                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                    • API String ID: 2018770650-1062637481
                                                                                    • Opcode ID: 78e9a0c60d0240490e5c5feb46657d4e66488ff5cbc97c14d329eb4699cc9f23
                                                                                    • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                                                                                    • Opcode Fuzzy Hash: 78e9a0c60d0240490e5c5feb46657d4e66488ff5cbc97c14d329eb4699cc9f23
                                                                                    • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                    • GetLastError.KERNEL32 ref: 00416B02
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                    • String ID: SeShutdownPrivilege
                                                                                    • API String ID: 3534403312-3733053543
                                                                                    • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                    • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                                                                    • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                    • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 004089AE
                                                                                      • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                      • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                                                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                                                      • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,LAL,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000), ref: 0040450E
                                                                                      • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000,?,?,?,?,?,00414CE9), ref: 0040453C
                                                                                      • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                      • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                      • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                                                    • String ID:
                                                                                    • API String ID: 4043647387-0
                                                                                    • Opcode ID: 73aac0979cc44a5af952c6c4c76304318b602f0816e27281275e32879ca79799
                                                                                    • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                                                                                    • Opcode Fuzzy Hash: 73aac0979cc44a5af952c6c4c76304318b602f0816e27281275e32879ca79799
                                                                                    • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                                                                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                    • String ID:
                                                                                    • API String ID: 276877138-0
                                                                                    • Opcode ID: f46ec876707130a0260c1e36ee5cf16398cc126bc88f3db2dc71360ab7e78e5c
                                                                                    • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                                                                    • Opcode Fuzzy Hash: f46ec876707130a0260c1e36ee5cf16398cc126bc88f3db2dc71360ab7e78e5c
                                                                                    • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                                                                    APIs
                                                                                      • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                      • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                      • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                      • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                      • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                                                                    • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                                                                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                    • String ID: PowrProf.dll$SetSuspendState
                                                                                    • API String ID: 1589313981-1420736420
                                                                                    • Opcode ID: 88daae454c5c5e7b4bcbe3c668470204f0692d42defdac9e8fdbe48c21985f85
                                                                                    • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                                                                                    • Opcode Fuzzy Hash: 88daae454c5c5e7b4bcbe3c668470204f0692d42defdac9e8fdbe48c21985f85
                                                                                    • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0045127C
                                                                                    • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004512A5
                                                                                    • GetACP.KERNEL32 ref: 004512BA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID: ACP$OCP
                                                                                    • API String ID: 2299586839-711371036
                                                                                    • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                    • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                                                                    • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                    • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                                                                    APIs
                                                                                    • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                                                                                    • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                                                                    • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                                                                    • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                    • String ID: SETTINGS
                                                                                    • API String ID: 3473537107-594951305
                                                                                    • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                    • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                                                                    • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                    • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                                                                    APIs
                                                                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                                                                    • GetUserDefaultLCID.KERNEL32 ref: 004514C3
                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00451594
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                    • String ID:
                                                                                    • API String ID: 745075371-0
                                                                                    • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                    • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                                                                    • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                    • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 00407A91
                                                                                    • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$File$CloseFirstH_prologNext
                                                                                    • String ID:
                                                                                    • API String ID: 1157919129-0
                                                                                    • Opcode ID: cbdb00a62da93d6542ee4ff4dfc5cb414ef77137fb6a31f75354bae693a732ea
                                                                                    • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                                                                    • Opcode Fuzzy Hash: cbdb00a62da93d6542ee4ff4dfc5cb414ef77137fb6a31f75354bae693a732ea
                                                                                    • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                                                                    APIs
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DownloadExecuteFileShell
                                                                                    • String ID: C:\Users\user\Desktop\eBHn6qHPLz.exe$open
                                                                                    • API String ID: 2825088817-3403555662
                                                                                    • Opcode ID: eb3315e4042bf17ef91b91cac1ef2097154a434981d811c84234fb7dfa98d7e9
                                                                                    • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                                                                                    • Opcode Fuzzy Hash: eb3315e4042bf17ef91b91cac1ef2097154a434981d811c84234fb7dfa98d7e9
                                                                                    • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileFind$FirstNextsend
                                                                                    • String ID: x@G$x@G
                                                                                    • API String ID: 4113138495-3390264752
                                                                                    • Opcode ID: 75ed5dc638d7fa6cc59ebe72a35b70cc5d7a83de0aca34a7055994ed8814fc7c
                                                                                    • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                                                                    • Opcode Fuzzy Hash: 75ed5dc638d7fa6cc59ebe72a35b70cc5d7a83de0aca34a7055994ed8814fc7c
                                                                                    • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                                                                    APIs
                                                                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                      • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                      • Part of subcall function 004126D2: RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                      • Part of subcall function 004126D2: RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateInfoParametersSystemValue
                                                                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                    • API String ID: 4127273184-3576401099
                                                                                    • Opcode ID: f4ba7aec24a953ef4b92a26ea97f229a08492362b077529f009aa708e5b31fc0
                                                                                    • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                                                                    • Opcode Fuzzy Hash: f4ba7aec24a953ef4b92a26ea97f229a08492362b077529f009aa708e5b31fc0
                                                                                    • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                                                                    APIs
                                                                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                      • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                      • Part of subcall function 004126D2: RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                      • Part of subcall function 004126D2: RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateInfoParametersSystemValue
                                                                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                    • API String ID: 4127273184-3576401099
                                                                                    • Opcode ID: 3cca19850bf31f4f0fb7f64d74422f26e2d0d512dadd11c93372ceda303b45d5
                                                                                    • Instruction ID: f2617a255fd7246e173cf48333a5ec3092ca3a632a8680fa2b2f8bd5747a896b
                                                                                    • Opcode Fuzzy Hash: 3cca19850bf31f4f0fb7f64d74422f26e2d0d512dadd11c93372ceda303b45d5
                                                                                    • Instruction Fuzzy Hash: 9EF0623278011422D529357A8E2FBEE1801D796B20F65402FF202A57D6FB8E46D142DE
                                                                                    APIs
                                                                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 00450B61
                                                                                    • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                                                                    • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00450CA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                    • String ID:
                                                                                    • API String ID: 4212172061-0
                                                                                    • Opcode ID: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                                                                    • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                                                                    • Opcode Fuzzy Hash: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                                                                    • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 00408DAC
                                                                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileFind$FirstH_prologNext
                                                                                    • String ID:
                                                                                    • API String ID: 301083792-0
                                                                                    • Opcode ID: 2be7f92d6da1bca50da8a8149fcd1e76221c43e06e36dbb9ea3417957fbb6dec
                                                                                    • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                                                                                    • Opcode Fuzzy Hash: 2be7f92d6da1bca50da8a8149fcd1e76221c43e06e36dbb9ea3417957fbb6dec
                                                                                    • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 00448067
                                                                                      • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                    • GetTimeZoneInformation.KERNEL32 ref: 00448079
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,?,0047179C,000000FF,?,0000003F,?,?), ref: 004480F1
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,?,004717F0,000000FF,?,0000003F,?,?,?,0047179C,000000FF,?,0000003F,?,?), ref: 0044811E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                    • String ID:
                                                                                    • API String ID: 806657224-0
                                                                                    • Opcode ID: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                                                                    • Instruction ID: ab6739d36243922ba69d1bbe12a1b6ae93f84769bc63f42ae41568d8b76a7737
                                                                                    • Opcode Fuzzy Hash: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                                                                    • Instruction Fuzzy Hash: 8731DA70904205DFEB149F68CC8186EBBF8FF05760B2442AFE054AB2A1DB349A42DB18
                                                                                    APIs
                                                                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                    • String ID:
                                                                                    • API String ID: 2829624132-0
                                                                                    • Opcode ID: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                                                                                    • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                                                                                    • Opcode Fuzzy Hash: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                                                                                    • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0043A755
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0043A75F
                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0043A76C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                    • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                                                                    • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                    • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                                                                    APIs
                                                                                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                                                                                    • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                                                                                    • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Crypt$Context$AcquireRandomRelease
                                                                                    • String ID:
                                                                                    • API String ID: 1815803762-0
                                                                                    • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                    • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                                                                    • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                    • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(?,?,0044252A,?), ref: 00442575
                                                                                    • TerminateProcess.KERNEL32(00000000,?,0044252A,?), ref: 0044257C
                                                                                    • ExitProcess.KERNEL32 ref: 0044258E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 1703294689-0
                                                                                    • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                    • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                                                                    • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                    • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88
                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID: GetLocaleInfoEx
                                                                                    • API String ID: 2299586839-2904428671
                                                                                    • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                    • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                                                                    • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                    • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                                                                    APIs
                                                                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                    • String ID:
                                                                                    • API String ID: 1663032902-0
                                                                                    • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                    • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                                                                    • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                    • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                                                                    APIs
                                                                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                    • EnumSystemLocalesW.KERNEL32(00450E6A,00000001), ref: 00450DB4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                    • String ID:
                                                                                    • API String ID: 1084509184-0
                                                                                    • Opcode ID: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                                                                                    • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                                                                                    • Opcode Fuzzy Hash: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                                                                                    • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                                                                                    APIs
                                                                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$InfoLocale_abort_free
                                                                                    • String ID:
                                                                                    • API String ID: 2692324296-0
                                                                                    • Opcode ID: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                                                                    • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                                                                    • Opcode Fuzzy Hash: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                                                                    • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                                                                    APIs
                                                                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                    • EnumSystemLocalesW.KERNEL32(004510BA,00000001), ref: 00450E29
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                    • String ID:
                                                                                    • API String ID: 1084509184-0
                                                                                    • Opcode ID: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                                                                                    • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                                                                                    • Opcode Fuzzy Hash: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                                                                                    • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                                                                                    APIs
                                                                                      • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(?,?,0044225B,00000000,0046DAC0,0000000C,00442216,?,?,?,00448739,?,?,00446F74,00000001,00000364), ref: 00444ADB
                                                                                    • EnumSystemLocalesW.KERNEL32(Function_00047068,00000001,0046DC48,0000000C), ref: 004470E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                    • String ID:
                                                                                    • API String ID: 1272433827-0
                                                                                    • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                                    • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                                                                    • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                                    • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                                                                    APIs
                                                                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                    • EnumSystemLocalesW.KERNEL32(00450C4E,00000001), ref: 00450D2E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                    • String ID:
                                                                                    • API String ID: 1084509184-0
                                                                                    • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                                    • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                                                                                    • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                                    • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                                                                                    APIs
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                    • String ID:
                                                                                    • API String ID: 3192549508-0
                                                                                    • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                                    • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                                                                                    • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                                    • Instruction Fuzzy Hash:
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: HeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 54951025-0
                                                                                    • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                                    • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                                                                    • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                                    • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                                                                    APIs
                                                                                    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                                                                      • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                                                                                    • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                                                                                    • DeleteDC.GDI32(?), ref: 0041805D
                                                                                    • DeleteDC.GDI32(00000000), ref: 00418060
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                                                                                    • GetIconInfo.USER32(?,?), ref: 004180CB
                                                                                    • DeleteObject.GDI32(?), ref: 004180FA
                                                                                    • DeleteObject.GDI32(?), ref: 00418107
                                                                                    • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                                                                                    • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                                                                                    • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                                                                                    • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                                                                                    • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                                                                                    • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                                                                                    • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                                                                                    • DeleteDC.GDI32(?), ref: 0041827F
                                                                                    • DeleteDC.GDI32(00000000), ref: 00418282
                                                                                    • DeleteObject.GDI32(00000000), ref: 00418285
                                                                                    • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                                                                                    • DeleteObject.GDI32(00000000), ref: 00418344
                                                                                    • GlobalFree.KERNEL32(?), ref: 0041834B
                                                                                    • DeleteDC.GDI32(?), ref: 0041835B
                                                                                    • DeleteDC.GDI32(00000000), ref: 00418366
                                                                                    • DeleteDC.GDI32(?), ref: 00418398
                                                                                    • DeleteDC.GDI32(00000000), ref: 0041839B
                                                                                    • DeleteObject.GDI32(?), ref: 004183A1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                                                                                    • String ID: DISPLAY
                                                                                    • API String ID: 1765752176-865373369
                                                                                    • Opcode ID: 41737f7958c27616f3a58b728f0403f4687adc2766d706bcb7bebe4ca6d3757a
                                                                                    • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                                                                                    • Opcode Fuzzy Hash: 41737f7958c27616f3a58b728f0403f4687adc2766d706bcb7bebe4ca6d3757a
                                                                                    • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                                                                    • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                                                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                                                                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                                                                    • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                                                                    • ResumeThread.KERNEL32(?), ref: 00417582
                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                                                                    • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                                                                    • GetLastError.KERNEL32 ref: 004175C7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                    • API String ID: 4188446516-3035715614
                                                                                    • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                                    • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                                                                    • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                                    • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                                                                                    APIs
                                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                                                                    • ExitProcess.KERNEL32 ref: 0041151D
                                                                                      • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                      • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                      • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                      • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                                                                    • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                                                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                                                                      • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                      • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                      • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                    • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                                                                    • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                                                                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                                                                    • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                                                                      • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B5EB
                                                                                      • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B5FF
                                                                                      • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000), ref: 0041B60C
                                                                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                                                                    • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                                                                    • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                                                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                                                                      • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5CE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                                                    • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                                                                    • API String ID: 4250697656-2665858469
                                                                                    • Opcode ID: c45581ac137712a93e0a6d9d7403759df41187074cfe6de530b3a898dba868e6
                                                                                    • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                                                                    • Opcode Fuzzy Hash: c45581ac137712a93e0a6d9d7403759df41187074cfe6de530b3a898dba868e6
                                                                                    • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                                                                    APIs
                                                                                      • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                      • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                                                                      • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                      • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                      • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                      • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                                                                    • ExitProcess.KERNEL32 ref: 0040C287
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                    • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                                    • API String ID: 3797177996-1998216422
                                                                                    • Opcode ID: 475189482f48cb4f9207cadb0d075e279ee8dd863a2991a2afe7c2dc799e2656
                                                                                    • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                                                                                    • Opcode Fuzzy Hash: 475189482f48cb4f9207cadb0d075e279ee8dd863a2991a2afe7c2dc799e2656
                                                                                    • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                                                                                    APIs
                                                                                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                                                                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                                                                                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                                                                                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                                                                                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                                                                                    • SetEvent.KERNEL32 ref: 0041A38A
                                                                                    • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                                                                    • CloseHandle.KERNEL32 ref: 0041A3AB
                                                                                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                                                                                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                                                                    • API String ID: 738084811-1408154895
                                                                                    • Opcode ID: af53c4a5fa9e37a5d702ee23a23f445c634cd4f612951b57f50ba1ab970ff472
                                                                                    • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                                                                    • Opcode Fuzzy Hash: af53c4a5fa9e37a5d702ee23a23f445c634cd4f612951b57f50ba1ab970ff472
                                                                                    • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                                                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                                                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                                                    • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                                                                    • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                                                                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                                                    • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                                                                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$Write$Create
                                                                                    • String ID: RIFF$WAVE$data$fmt
                                                                                    • API String ID: 1602526932-4212202414
                                                                                    • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                    • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                                                                    • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                    • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\eBHn6qHPLz.exe,00000001,004068B2,C:\Users\user\Desktop\eBHn6qHPLz.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: C:\Users\user\Desktop\eBHn6qHPLz.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                    • API String ID: 1646373207-2195010499
                                                                                    • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                    • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                                                                    • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                    • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 0040BC75
                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\eBHn6qHPLz.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                                                    • _wcslen.LIBCMT ref: 0040BD54
                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\eBHn6qHPLz.exe,00000000,00000000), ref: 0040BDF2
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                                                    • _wcslen.LIBCMT ref: 0040BE34
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                                                                    • ExitProcess.KERNEL32 ref: 0040BED0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                    • String ID: 6$C:\Users\user\Desktop\eBHn6qHPLz.exe$del$open$BG$BG
                                                                                    • API String ID: 1579085052-3883073736
                                                                                    • Opcode ID: 13d91325c2fc1637e7a2af69a899dc1629583606b9777977535954d375703d33
                                                                                    • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                                                                    • Opcode Fuzzy Hash: 13d91325c2fc1637e7a2af69a899dc1629583606b9777977535954d375703d33
                                                                                    • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                                                                    • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                                                                                    • lstrlenW.KERNEL32(?), ref: 0041B207
                                                                                    • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                                                                                    • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                                                                    • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                                                                    • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                                                                    • _wcslen.LIBCMT ref: 0041B2DB
                                                                                    • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                                                                    • GetLastError.KERNEL32 ref: 0041B313
                                                                                    • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                                                                    • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                                                                    • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                                                                    • GetLastError.KERNEL32 ref: 0041B370
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                    • String ID: ?
                                                                                    • API String ID: 3941738427-1684325040
                                                                                    • Opcode ID: 17f0383a2199e65fad79c02efdfd6f833a281a6f5bd6be27e9a359bd3f4b92bf
                                                                                    • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                                                                    • Opcode Fuzzy Hash: 17f0383a2199e65fad79c02efdfd6f833a281a6f5bd6be27e9a359bd3f4b92bf
                                                                                    • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$EnvironmentVariable$_wcschr
                                                                                    • String ID:
                                                                                    • API String ID: 3899193279-0
                                                                                    • Opcode ID: 3115d919f98adbdf348e15764fef8bbbb7a878b40742b6c11840eb3b67a2620e
                                                                                    • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                                                                    • Opcode Fuzzy Hash: 3115d919f98adbdf348e15764fef8bbbb7a878b40742b6c11840eb3b67a2620e
                                                                                    • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                                                                    APIs
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                                                                      • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                    • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                                                                    • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                                                                    • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                                                                    • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                                                                    • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                                                                    • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                                                                    • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                                                                    • Sleep.KERNEL32(00000064), ref: 00412060
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                    • String ID: /stext "$HDG$HDG$>G$>G
                                                                                    • API String ID: 1223786279-3931108886
                                                                                    • Opcode ID: 6332f38b00229a6e20b82c4f038c42492cd35cd0c811e036df3020b4a54ac4ec
                                                                                    • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                                                                                    • Opcode Fuzzy Hash: 6332f38b00229a6e20b82c4f038c42492cd35cd0c811e036df3020b4a54ac4ec
                                                                                    • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                                                                                    APIs
                                                                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                    • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                                    • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                    • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                    • API String ID: 2490988753-744132762
                                                                                    • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                                                    • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                                                                                    • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                                                    • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                                                                                    APIs
                                                                                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                                                                                    • GetCursorPos.USER32(?), ref: 0041CAF8
                                                                                    • SetForegroundWindow.USER32(?), ref: 0041CB01
                                                                                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                                                                    • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                                                                                    • ExitProcess.KERNEL32 ref: 0041CB74
                                                                                    • CreatePopupMenu.USER32 ref: 0041CB7A
                                                                                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                    • String ID: Close
                                                                                    • API String ID: 1657328048-3535843008
                                                                                    • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                    • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                                                                    • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                    • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$Info
                                                                                    • String ID:
                                                                                    • API String ID: 2509303402-0
                                                                                    • Opcode ID: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                                                                                    • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                                                                                    • Opcode Fuzzy Hash: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                                                                                    • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                                                                    • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                                                    • __aulldiv.LIBCMT ref: 00407FE9
                                                                                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                                                    • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                                                                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                                                                    • API String ID: 1884690901-3066803209
                                                                                    • Opcode ID: eb01ef5b1109935deb9b201889b3e738055f3ba1650b4809c8501a5029a4dec9
                                                                                    • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                                                                                    • Opcode Fuzzy Hash: eb01ef5b1109935deb9b201889b3e738055f3ba1650b4809c8501a5029a4dec9
                                                                                    • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(00001388), ref: 00409E62
                                                                                      • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                      • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                      • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                      • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                                                      • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                    • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                                                                    • API String ID: 3795512280-3163867910
                                                                                    • Opcode ID: 4288c6e44f3cc3481b41d43c675bd82dd3059d5aa9f2f8d7606941a29be650a6
                                                                                    • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                                                                                    • Opcode Fuzzy Hash: 4288c6e44f3cc3481b41d43c675bd82dd3059d5aa9f2f8d7606941a29be650a6
                                                                                    • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A
                                                                                    APIs
                                                                                    • ___free_lconv_mon.LIBCMT ref: 004500B1
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                                                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                                                                    • _free.LIBCMT ref: 004500A6
                                                                                      • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                    • _free.LIBCMT ref: 004500C8
                                                                                    • _free.LIBCMT ref: 004500DD
                                                                                    • _free.LIBCMT ref: 004500E8
                                                                                    • _free.LIBCMT ref: 0045010A
                                                                                    • _free.LIBCMT ref: 0045011D
                                                                                    • _free.LIBCMT ref: 0045012B
                                                                                    • _free.LIBCMT ref: 00450136
                                                                                    • _free.LIBCMT ref: 0045016E
                                                                                    • _free.LIBCMT ref: 00450175
                                                                                    • _free.LIBCMT ref: 00450192
                                                                                    • _free.LIBCMT ref: 004501AA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                    • String ID:
                                                                                    • API String ID: 161543041-0
                                                                                    • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                    • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                                                                    • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                    • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 0041912D
                                                                                    • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                                                                    • Sleep.KERNEL32(000003E8), ref: 0041926D
                                                                                    • GetLocalTime.KERNEL32(?), ref: 0041927C
                                                                                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                    • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                                    • API String ID: 489098229-65789007
                                                                                    • Opcode ID: 211e22c9c9deca564b7aeaa6dbcd5082c95bf0d4ea8bdfccbebae96c771dbd88
                                                                                    • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                                                                    • Opcode Fuzzy Hash: 211e22c9c9deca564b7aeaa6dbcd5082c95bf0d4ea8bdfccbebae96c771dbd88
                                                                                    • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                                                                    APIs
                                                                                      • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                      • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                      • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                      • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                      • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                                                                    • ExitProcess.KERNEL32 ref: 0040C832
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                    • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                    • API String ID: 1913171305-390638927
                                                                                    • Opcode ID: 49af9dfd8d47ee06a9a451e5cc659c42439d815fba2bc7a33918d71022b3bc00
                                                                                    • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                                                                    • Opcode Fuzzy Hash: 49af9dfd8d47ee06a9a451e5cc659c42439d815fba2bc7a33918d71022b3bc00
                                                                                    • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                                    • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                                                                                    • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                                    • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                    • closesocket.WS2_32(000000FF), ref: 0040481F
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404856
                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404867
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040486E
                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404880
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404885
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040488A
                                                                                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404895
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 0040489A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                    • String ID:
                                                                                    • API String ID: 3658366068-0
                                                                                    • Opcode ID: c0811b9552baa960996580efd3a95ddbe219791cb6e29288b5199f5b52bda897
                                                                                    • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                                                                    • Opcode Fuzzy Hash: c0811b9552baa960996580efd3a95ddbe219791cb6e29288b5199f5b52bda897
                                                                                    • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48
                                                                                    APIs
                                                                                      • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                                                                                    • GetLastError.KERNEL32 ref: 00454A96
                                                                                    • __dosmaperr.LIBCMT ref: 00454A9D
                                                                                    • GetFileType.KERNEL32(00000000), ref: 00454AA9
                                                                                    • GetLastError.KERNEL32 ref: 00454AB3
                                                                                    • __dosmaperr.LIBCMT ref: 00454ABC
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                                                                                    • CloseHandle.KERNEL32(?), ref: 00454C26
                                                                                    • GetLastError.KERNEL32 ref: 00454C58
                                                                                    • __dosmaperr.LIBCMT ref: 00454C5F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                    • String ID: H
                                                                                    • API String ID: 4237864984-2852464175
                                                                                    • Opcode ID: 6ee1e536fdc7f2f0b5cfdc99f6d3f503e334a2caa4375aff0222a5d39aa192cc
                                                                                    • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                                                                                    • Opcode Fuzzy Hash: 6ee1e536fdc7f2f0b5cfdc99f6d3f503e334a2caa4375aff0222a5d39aa192cc
                                                                                    • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 0040A456
                                                                                    • Sleep.KERNEL32(000001F4), ref: 0040A461
                                                                                    • GetForegroundWindow.USER32 ref: 0040A467
                                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                                    • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                                    • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                                      • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                    • String ID: [${ User has been idle for $ minutes }$]
                                                                                    • API String ID: 911427763-3954389425
                                                                                    • Opcode ID: b86ee15b21bba71f09a45711b04c83d95403ed5aec086fa4519582c6d215eebf
                                                                                    • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                                                                    • Opcode Fuzzy Hash: b86ee15b21bba71f09a45711b04c83d95403ed5aec086fa4519582c6d215eebf
                                                                                    • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 65535$udp
                                                                                    • API String ID: 0-1267037602
                                                                                    • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                                    • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                                                                    • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                                    • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                                                                                    • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                                                                                    • __dosmaperr.LIBCMT ref: 004393CD
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                                                                                    • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                                                                                    • __dosmaperr.LIBCMT ref: 0043940A
                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                                                                                    • __dosmaperr.LIBCMT ref: 0043945E
                                                                                    • _free.LIBCMT ref: 0043946A
                                                                                    • _free.LIBCMT ref: 00439471
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                    • String ID:
                                                                                    • API String ID: 2441525078-0
                                                                                    • Opcode ID: 2894fcbb1f162653cfe1ba04bc0a5a8f03630905280e1a3511de0c112cb5b03f
                                                                                    • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                                                                                    • Opcode Fuzzy Hash: 2894fcbb1f162653cfe1ba04bc0a5a8f03630905280e1a3511de0c112cb5b03f
                                                                                    • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                                                                                    APIs
                                                                                    • SetEvent.KERNEL32(?), ref: 00404E71
                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                                    • TranslateMessage.USER32(?), ref: 00404F30
                                                                                    • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074), ref: 00404FF3
                                                                                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                    • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                    • API String ID: 2956720200-749203953
                                                                                    • Opcode ID: e4f5b5fc0aabe6406bb8c73db470f5dfa7ae870dfb2b55d15e46a491ab3a2f18
                                                                                    • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                                                                                    • Opcode Fuzzy Hash: e4f5b5fc0aabe6406bb8c73db470f5dfa7ae870dfb2b55d15e46a491ab3a2f18
                                                                                    • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                                                                    • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                                                                    • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                                    • String ID: <$@$@FG$@FG$Temp
                                                                                    • API String ID: 1107811701-2245803885
                                                                                    • Opcode ID: 4edece4769a03516754e38825d2706aa35b1ef30865bd65ae9e89413f2e2b896
                                                                                    • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                                                                                    • Opcode Fuzzy Hash: 4edece4769a03516754e38825d2706aa35b1ef30865bd65ae9e89413f2e2b896
                                                                                    • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                                                                    • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\Desktop\eBHn6qHPLz.exe), ref: 00406705
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CurrentProcess
                                                                                    • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                                                                                    • API String ID: 2050909247-4145329354
                                                                                    • Opcode ID: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                                                                    • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                                                                                    • Opcode Fuzzy Hash: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                                                                    • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                    • String ID:
                                                                                    • API String ID: 221034970-0
                                                                                    • Opcode ID: eac2432222f4f4afde1f7cf6c47f526356f61b0485a7c29ded5a18ae6df5b8f9
                                                                                    • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                                                                                    • Opcode Fuzzy Hash: eac2432222f4f4afde1f7cf6c47f526356f61b0485a7c29ded5a18ae6df5b8f9
                                                                                    • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 00446DDF
                                                                                      • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                    • _free.LIBCMT ref: 00446DEB
                                                                                    • _free.LIBCMT ref: 00446DF6
                                                                                    • _free.LIBCMT ref: 00446E01
                                                                                    • _free.LIBCMT ref: 00446E0C
                                                                                    • _free.LIBCMT ref: 00446E17
                                                                                    • _free.LIBCMT ref: 00446E22
                                                                                    • _free.LIBCMT ref: 00446E2D
                                                                                    • _free.LIBCMT ref: 00446E38
                                                                                    • _free.LIBCMT ref: 00446E46
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                    • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                                                                                    • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                    • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Eventinet_ntoa
                                                                                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                                                                    • API String ID: 3578746661-4192532303
                                                                                    • Opcode ID: 49c09aa35feb609e8cb786ad235985bd977087c855b496bc3c3cc4c3f4947f39
                                                                                    • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                                                                    • Opcode Fuzzy Hash: 49c09aa35feb609e8cb786ad235985bd977087c855b496bc3c3cc4c3f4947f39
                                                                                    • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                                                                    APIs
                                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DecodePointer
                                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                    • API String ID: 3527080286-3064271455
                                                                                    • Opcode ID: ab61d69453e4831c81f6a46e39f254611e12c2bb616dca0b6d42b24218e76fcf
                                                                                    • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                                                                                    • Opcode Fuzzy Hash: ab61d69453e4831c81f6a46e39f254611e12c2bb616dca0b6d42b24218e76fcf
                                                                                    • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                                                                                    APIs
                                                                                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                                                                      • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                    • Sleep.KERNEL32(00000064), ref: 00416688
                                                                                    • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CreateDeleteExecuteShellSleep
                                                                                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                    • API String ID: 1462127192-2001430897
                                                                                    • Opcode ID: 6582b4deb2fdd1bb19831d0e601f0a64b5db4342ad67d7269b5c3eb205dae325
                                                                                    • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                                                                    • Opcode Fuzzy Hash: 6582b4deb2fdd1bb19831d0e601f0a64b5db4342ad67d7269b5c3eb205dae325
                                                                                    • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                                                                    APIs
                                                                                    • _strftime.LIBCMT ref: 00401AD3
                                                                                      • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                    • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                                                                    • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                                                                    • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                    • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                                                                    • API String ID: 3809562944-3643129801
                                                                                    • Opcode ID: 345b56c1d82031e04d37830536159a97120268d502f181c40b036ab8dc295279
                                                                                    • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                                                                    • Opcode Fuzzy Hash: 345b56c1d82031e04d37830536159a97120268d502f181c40b036ab8dc295279
                                                                                    • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                                                                    APIs
                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                                    • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                                                    • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                                                                    • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                                                                    • waveInStart.WINMM ref: 00401A81
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                    • String ID: XCG$`=G$x=G
                                                                                    • API String ID: 1356121797-903574159
                                                                                    • Opcode ID: 26fe90a91a06c390124097d879efed6aeabfafde605fe0cb44867ace1fe750fb
                                                                                    • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                                                                    • Opcode Fuzzy Hash: 26fe90a91a06c390124097d879efed6aeabfafde605fe0cb44867ace1fe750fb
                                                                                    • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                                                                    APIs
                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                                                                      • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                      • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                      • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                                                                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                                                                    • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                                                                                    • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                                                                                    • TranslateMessage.USER32(?), ref: 0041C9FB
                                                                                    • DispatchMessageA.USER32(?), ref: 0041CA05
                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                    • String ID: Remcos
                                                                                    • API String ID: 1970332568-165870891
                                                                                    • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                    • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                                                                    • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                    • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0747812b3ef30bf307ff75b73c960c026ca27f542f29018827700d11bc9c6ccf
                                                                                    • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                                                                    • Opcode Fuzzy Hash: 0747812b3ef30bf307ff75b73c960c026ca27f542f29018827700d11bc9c6ccf
                                                                                    • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(?,?), ref: 00452BD6
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452C59
                                                                                    • __alloca_probe_16.LIBCMT ref: 00452C91
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452CEC
                                                                                    • __alloca_probe_16.LIBCMT ref: 00452D3B
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452D03
                                                                                      • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433627,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B31
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452D7F
                                                                                    • __freea.LIBCMT ref: 00452DAA
                                                                                    • __freea.LIBCMT ref: 00452DB6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                    • String ID:
                                                                                    • API String ID: 201697637-0
                                                                                    • Opcode ID: 5a84a6a5317ae172974df595155495cbc46435c9615446bda379f5f3d343e1a3
                                                                                    • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                                                                    • Opcode Fuzzy Hash: 5a84a6a5317ae172974df595155495cbc46435c9615446bda379f5f3d343e1a3
                                                                                    • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                                                                    APIs
                                                                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                    • _memcmp.LIBVCRUNTIME ref: 004446A3
                                                                                    • _free.LIBCMT ref: 00444714
                                                                                    • _free.LIBCMT ref: 0044472D
                                                                                    • _free.LIBCMT ref: 0044475F
                                                                                    • _free.LIBCMT ref: 00444768
                                                                                    • _free.LIBCMT ref: 00444774
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorLast$_abort_memcmp
                                                                                    • String ID: C
                                                                                    • API String ID: 1679612858-1037565863
                                                                                    • Opcode ID: e798a5b4f7493c74d130a4fbedb1f55cb471893974bd6d85dd9ea41d0b6f3bee
                                                                                    • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                                                                    • Opcode Fuzzy Hash: e798a5b4f7493c74d130a4fbedb1f55cb471893974bd6d85dd9ea41d0b6f3bee
                                                                                    • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: tcp$udp
                                                                                    • API String ID: 0-3725065008
                                                                                    • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                                    • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                                                                    • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                                    • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID: gKE$HE$HE
                                                                                    • API String ID: 269201875-2777690135
                                                                                    • Opcode ID: 65ff1149e5400faf749e77ee0a373f8307c7a4f77e118ae33a4d82d27c9b20c0
                                                                                    • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                                                                    • Opcode Fuzzy Hash: 65ff1149e5400faf749e77ee0a373f8307c7a4f77e118ae33a4d82d27c9b20c0
                                                                                    • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                                                                    APIs
                                                                                    • ExitThread.KERNEL32 ref: 004017F4
                                                                                      • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                      • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                                                                      • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                    • __Init_thread_footer.LIBCMT ref: 004017BC
                                                                                      • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                      • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                    • String ID: T=G$p[G$>G$>G
                                                                                    • API String ID: 1596592924-2461731529
                                                                                    • Opcode ID: 91d67f37a8430a0885800b6cfa2811784eca0c36a97f982fdc7fc6823e8a1c44
                                                                                    • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                                                                    • Opcode Fuzzy Hash: 91d67f37a8430a0885800b6cfa2811784eca0c36a97f982fdc7fc6823e8a1c44
                                                                                    • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                                                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                                                      • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                      • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                    • String ID: .part
                                                                                    • API String ID: 1303771098-3499674018
                                                                                    • Opcode ID: 27401cd10f9d1020cbbfbeb02769fdc26ec02d3fd496a424ec516294df5507e8
                                                                                    • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                                                                    • Opcode Fuzzy Hash: 27401cd10f9d1020cbbfbeb02769fdc26ec02d3fd496a424ec516294df5507e8
                                                                                    • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                                                                    APIs
                                                                                      • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                                                                      • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                                                                      • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                                                                      • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                    • _wcslen.LIBCMT ref: 0041A8F6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                                    • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                                                                    • API String ID: 37874593-703403762
                                                                                    • Opcode ID: 8a6c4d698cc58011d67a224944d997277571159de44189b964043ef0793dda29
                                                                                    • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                                                                                    • Opcode Fuzzy Hash: 8a6c4d698cc58011d67a224944d997277571159de44189b964043ef0793dda29
                                                                                    • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 004499AA
                                                                                    • __alloca_probe_16.LIBCMT ref: 004499E2
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 00449A30
                                                                                    • __alloca_probe_16.LIBCMT ref: 00449AC7
                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                                                                    • __freea.LIBCMT ref: 00449B37
                                                                                      • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433627,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B31
                                                                                    • __freea.LIBCMT ref: 00449B40
                                                                                    • __freea.LIBCMT ref: 00449B65
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 3864826663-0
                                                                                    • Opcode ID: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                                                                                    • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                                                                    • Opcode Fuzzy Hash: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                                                                                    • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                                                                    APIs
                                                                                    • SendInput.USER32 ref: 00418B08
                                                                                    • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                                                                                    • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                                                                      • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InputSend$Virtual
                                                                                    • String ID:
                                                                                    • API String ID: 1167301434-0
                                                                                    • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                    • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                                                                                    • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                    • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                                                                                    APIs
                                                                                    • OpenClipboard.USER32 ref: 00415A46
                                                                                    • EmptyClipboard.USER32 ref: 00415A54
                                                                                    • CloseClipboard.USER32 ref: 00415A5A
                                                                                    • OpenClipboard.USER32 ref: 00415A61
                                                                                    • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                    • CloseClipboard.USER32 ref: 00415A89
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                    • String ID:
                                                                                    • API String ID: 2172192267-0
                                                                                    • Opcode ID: d32518604b12d406faeb8ef8c433a1cc8e60666863f91bca2b947bcb79a96d3d
                                                                                    • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                                                                                    • Opcode Fuzzy Hash: d32518604b12d406faeb8ef8c433a1cc8e60666863f91bca2b947bcb79a96d3d
                                                                                    • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                                                                                    • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                                                                    • Opcode Fuzzy Hash: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                                                                                    • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                                                                    APIs
                                                                                      • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433627,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B31
                                                                                    • _free.LIBCMT ref: 00444086
                                                                                    • _free.LIBCMT ref: 0044409D
                                                                                    • _free.LIBCMT ref: 004440BC
                                                                                    • _free.LIBCMT ref: 004440D7
                                                                                    • _free.LIBCMT ref: 004440EE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$AllocateHeap
                                                                                    • String ID: J7D
                                                                                    • API String ID: 3033488037-1677391033
                                                                                    • Opcode ID: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                                                                                    • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                                                                                    • Opcode Fuzzy Hash: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                                                                                    • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                                                                                    APIs
                                                                                    • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                                                                                    • __fassign.LIBCMT ref: 0044A180
                                                                                    • __fassign.LIBCMT ref: 0044A19B
                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                                                                                    • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                                                                    • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1324828854-0
                                                                                    • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                    • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                                                                    • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                    • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                                                                    APIs
                                                                                    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                                                                      • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                      • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseEnumInfoOpenQuerysend
                                                                                    • String ID: TUFTUF$>G$DG$DG
                                                                                    • API String ID: 3114080316-344394840
                                                                                    • Opcode ID: d3ff06a62fc9d364b91dac680586e45f71fe5a9a9f135b5a2f4a38eadb8e5969
                                                                                    • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                                                                                    • Opcode Fuzzy Hash: d3ff06a62fc9d364b91dac680586e45f71fe5a9a9f135b5a2f4a38eadb8e5969
                                                                                    • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00437B41
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                                    • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                                                                    • Opcode Fuzzy Hash: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                                    • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                                                                    APIs
                                                                                      • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                      • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                      • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                    • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                                    • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                    • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                    • API String ID: 1133728706-4073444585
                                                                                    • Opcode ID: 8b4c0817ba33c1c3e5b6589bf0059bbcabf50a11e0ad2e06528fc32cd89e84da
                                                                                    • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                                                                    • Opcode Fuzzy Hash: 8b4c0817ba33c1c3e5b6589bf0059bbcabf50a11e0ad2e06528fc32cd89e84da
                                                                                    • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 893373978a8f63a806f149930d37a519c5179eb32fa122ac40cbdb5ec79234b4
                                                                                    • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                                                                    • Opcode Fuzzy Hash: 893373978a8f63a806f149930d37a519c5179eb32fa122ac40cbdb5ec79234b4
                                                                                    • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                                                                    • int.LIBCPMT ref: 0040FC0F
                                                                                      • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                      • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                    • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                    • String ID: P[G
                                                                                    • API String ID: 2536120697-571123470
                                                                                    • Opcode ID: 9dc93271d8ca2c5a2fe1f23905a31ea5d19b989abd63f293402e2a51e6b4ac0b
                                                                                    • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                                                                                    • Opcode Fuzzy Hash: 9dc93271d8ca2c5a2fe1f23905a31ea5d19b989abd63f293402e2a51e6b4ac0b
                                                                                    • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                                                                                    APIs
                                                                                      • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                                                                                    • _free.LIBCMT ref: 0044FD29
                                                                                      • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                    • _free.LIBCMT ref: 0044FD34
                                                                                    • _free.LIBCMT ref: 0044FD3F
                                                                                    • _free.LIBCMT ref: 0044FD93
                                                                                    • _free.LIBCMT ref: 0044FD9E
                                                                                    • _free.LIBCMT ref: 0044FDA9
                                                                                    • _free.LIBCMT ref: 0044FDB4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                    • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                                                                                    • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                    • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                                                                                    APIs
                                                                                    • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\eBHn6qHPLz.exe), ref: 00406835
                                                                                      • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                                                      • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                    • CoUninitialize.OLE32 ref: 0040688E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InitializeObjectUninitialize_wcslen
                                                                                    • String ID: C:\Users\user\Desktop\eBHn6qHPLz.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                    • API String ID: 3851391207-157647841
                                                                                    • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                                    • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                                                                    • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                                    • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                                                                    • int.LIBCPMT ref: 0040FEF2
                                                                                      • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                      • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                    • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                    • String ID: H]G
                                                                                    • API String ID: 2536120697-1717957184
                                                                                    • Opcode ID: 831260e2e50258e734e800f671c2e221e985db4fe4157639c37b4271b6a7a30d
                                                                                    • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                                                                                    • Opcode Fuzzy Hash: 831260e2e50258e734e800f671c2e221e985db4fe4157639c37b4271b6a7a30d
                                                                                    • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                                                                                    APIs
                                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                                                    • GetLastError.KERNEL32 ref: 0040B2EE
                                                                                    Strings
                                                                                    • [Chrome Cookies not found], xrefs: 0040B308
                                                                                    • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                                                    • UserProfile, xrefs: 0040B2B4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DeleteErrorFileLast
                                                                                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                    • API String ID: 2018770650-304995407
                                                                                    • Opcode ID: 30ba9ef8288492daaa2ae16da57ee343412846dee84b3a61c2d15615ef6477a1
                                                                                    • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                                                                                    • Opcode Fuzzy Hash: 30ba9ef8288492daaa2ae16da57ee343412846dee84b3a61c2d15615ef6477a1
                                                                                    • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                                                                                    APIs
                                                                                    • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                                                                                    • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                                                                                    • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Console$AllocOutputShowWindow
                                                                                    • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                                                                    • API String ID: 2425139147-2527699604
                                                                                    • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                                                    • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                                                                                    • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                                                    • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: (CG$C:\Users\user\Desktop\eBHn6qHPLz.exe$BG
                                                                                    • API String ID: 0-1379618269
                                                                                    • Opcode ID: f596dccec36ba2edb01e8497e1ae222ff2b81d3db646b198ce2a52f1bf770b1f
                                                                                    • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                                                                    • Opcode Fuzzy Hash: f596dccec36ba2edb01e8497e1ae222ff2b81d3db646b198ce2a52f1bf770b1f
                                                                                    • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                                                                    APIs
                                                                                    • __allrem.LIBCMT ref: 00439789
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                                                                    • __allrem.LIBCMT ref: 004397BC
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                                                                    • __allrem.LIBCMT ref: 004397F1
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                    • String ID:
                                                                                    • API String ID: 1992179935-0
                                                                                    • Opcode ID: 90d3cbeaf7f932440d57ef5c22d3b8f6324572cbadffe2a0eaa56fc6fd551e6e
                                                                                    • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                                                                    • Opcode Fuzzy Hash: 90d3cbeaf7f932440d57ef5c22d3b8f6324572cbadffe2a0eaa56fc6fd551e6e
                                                                                    • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __cftoe
                                                                                    • String ID:
                                                                                    • API String ID: 4189289331-0
                                                                                    • Opcode ID: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                                                                                    • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                                                                    • Opcode Fuzzy Hash: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                                                                                    • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16
                                                                                    • String ID: a/p$am/pm
                                                                                    • API String ID: 3509577899-3206640213
                                                                                    • Opcode ID: b7a8f278bf47528e4a7b6c0293cf3492489fb7de6840faf8b14e2fc4a7d4cdfd
                                                                                    • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                                                                    • Opcode Fuzzy Hash: b7a8f278bf47528e4a7b6c0293cf3492489fb7de6840faf8b14e2fc4a7d4cdfd
                                                                                    • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                                                                                    • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                    • String ID:
                                                                                    • API String ID: 493672254-0
                                                                                    • Opcode ID: a2f105e535d183d5d78deb6f7d5fe7bea4f0d81e54f61eac1a98da6bf8b63e62
                                                                                    • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                                                                                    • Opcode Fuzzy Hash: a2f105e535d183d5d78deb6f7d5fe7bea4f0d81e54f61eac1a98da6bf8b63e62
                                                                                    • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                                                                                    • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 621d246bd99772174e6328e27007d7fc44d2e9bedb07ae0db1c9b20682e519a8
                                                                                    • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                                                                                    • Opcode Fuzzy Hash: 621d246bd99772174e6328e27007d7fc44d2e9bedb07ae0db1c9b20682e519a8
                                                                                    • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                                                                    • _free.LIBCMT ref: 00446EF6
                                                                                    • _free.LIBCMT ref: 00446F1E
                                                                                    • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                                                                    • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                                                                    • _abort.LIBCMT ref: 00446F3D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                    • String ID:
                                                                                    • API String ID: 3160817290-0
                                                                                    • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                                    • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                                                                                    • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                                    • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                    • String ID:
                                                                                    • API String ID: 221034970-0
                                                                                    • Opcode ID: e3fd1fc0c4787dc830b9cc3aea4eca8ac28d7cc032c9db4aeba6401df1942e4a
                                                                                    • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                                                                                    • Opcode Fuzzy Hash: e3fd1fc0c4787dc830b9cc3aea4eca8ac28d7cc032c9db4aeba6401df1942e4a
                                                                                    • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                                                                                    • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                    • String ID:
                                                                                    • API String ID: 221034970-0
                                                                                    • Opcode ID: cfedba9a7b07c5c42209e7ce9dcc6e811ae6a6b2ec58d24d97ebf78adb97293c
                                                                                    • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                                                                                    • Opcode Fuzzy Hash: cfedba9a7b07c5c42209e7ce9dcc6e811ae6a6b2ec58d24d97ebf78adb97293c
                                                                                    • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                                                                                    • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                    • String ID:
                                                                                    • API String ID: 221034970-0
                                                                                    • Opcode ID: 714e6f05c059ed682b6d949b249bc3bacd7887d9d17cdc3247a131cf9d717c91
                                                                                    • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                                                                                    • Opcode Fuzzy Hash: 714e6f05c059ed682b6d949b249bc3bacd7887d9d17cdc3247a131cf9d717c91
                                                                                    • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                                                                                    APIs
                                                                                    • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Enum$InfoQueryValue
                                                                                    • String ID: [regsplt]$DG
                                                                                    • API String ID: 3554306468-1089238109
                                                                                    • Opcode ID: cbb5a870c56cea5e502b7ee9715b6cda9ee9c78ea2f21c15369f297ce5ed795a
                                                                                    • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                                                                    • Opcode Fuzzy Hash: cbb5a870c56cea5e502b7ee9715b6cda9ee9c78ea2f21c15369f297ce5ed795a
                                                                                    • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                                                                    APIs
                                                                                      • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                      • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                                      • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                    • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                                                                      • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                      • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                                                                    • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                                                                                    • API String ID: 2974294136-753205382
                                                                                    • Opcode ID: 1c14d2c66797b625996c6e9b244d44b7c3afec25d7b35d879bbda5479d25afff
                                                                                    • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                                                                                    • Opcode Fuzzy Hash: 1c14d2c66797b625996c6e9b244d44b7c3afec25d7b35d879bbda5479d25afff
                                                                                    • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                                                                                    APIs
                                                                                    • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                    • wsprintfW.USER32 ref: 0040A905
                                                                                      • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: EventLocalTimewsprintf
                                                                                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                                    • API String ID: 1497725170-248792730
                                                                                    • Opcode ID: 4a46a74ce4dc637b5b74a9ad9fe6ae49bf816b22ad3df8bf75a5d637a5b9b51e
                                                                                    • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                                                                                    • Opcode Fuzzy Hash: 4a46a74ce4dc637b5b74a9ad9fe6ae49bf816b22ad3df8bf75a5d637a5b9b51e
                                                                                    • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                    • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseCreateHandleSizeSleep
                                                                                    • String ID: `AG
                                                                                    • API String ID: 1958988193-3058481221
                                                                                    • Opcode ID: 4b7d965d3464bb2d060ecaad018a0c75fbc041bdc5d21b9523507d02d46e7123
                                                                                    • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                                                                    • Opcode Fuzzy Hash: 4b7d965d3464bb2d060ecaad018a0c75fbc041bdc5d21b9523507d02d46e7123
                                                                                    • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D
                                                                                    APIs
                                                                                    • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                    • GetLastError.KERNEL32 ref: 0041CA91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ClassCreateErrorLastRegisterWindow
                                                                                    • String ID: 0$MsgWindowClass
                                                                                    • API String ID: 2877667751-2410386613
                                                                                    • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                                    • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                                                                    • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                                    • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                                                                    APIs
                                                                                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                                                    • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                                                    • CloseHandle.KERNEL32(?), ref: 00406A14
                                                                                    Strings
                                                                                    • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                                                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseHandle$CreateProcess
                                                                                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                    • API String ID: 2922976086-4183131282
                                                                                    • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                    • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                                                                                    • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                    • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 004425F9
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 0044262F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                    • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                                                                    • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                    • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                                                                    APIs
                                                                                    • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 0041277F
                                                                                    • RegSetValueExW.ADVAPI32(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,004742E0), ref: 004127AD
                                                                                    • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,004742E0), ref: 004127B8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateValue
                                                                                    • String ID: pth_unenc$BG
                                                                                    • API String ID: 1818849710-2233081382
                                                                                    • Opcode ID: 87978d4cbb2bd718b7edbb20148c75b812c3e6c6230698840110c73191dabcb0
                                                                                    • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                                                                    • Opcode Fuzzy Hash: 87978d4cbb2bd718b7edbb20148c75b812c3e6c6230698840110c73191dabcb0
                                                                                    • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                                                                    APIs
                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,004745A8,00414DB5,00000000,00000000,00000001), ref: 00404AED
                                                                                    • SetEvent.KERNEL32(?), ref: 00404AF9
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404B04
                                                                                    • CloseHandle.KERNEL32(?), ref: 00404B0D
                                                                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                    • String ID: KeepAlive | Disabled
                                                                                    • API String ID: 2993684571-305739064
                                                                                    • Opcode ID: be5f9c6fe4c4c3ab2425d129c1f16fb8e343b85419f062c206cfa9b62e194523
                                                                                    • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                                                                    • Opcode Fuzzy Hash: be5f9c6fe4c4c3ab2425d129c1f16fb8e343b85419f062c206cfa9b62e194523
                                                                                    • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                                                                    APIs
                                                                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                    • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                                                                                    • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                                                                                    • Sleep.KERNEL32(00002710), ref: 00419F79
                                                                                    • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                    • String ID: Alarm triggered
                                                                                    • API String ID: 614609389-2816303416
                                                                                    • Opcode ID: 69d5291e15693288b4d3e9b4f6d1ae394db74f315fb7dff35188cd3ac97623b5
                                                                                    • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                                                                                    • Opcode Fuzzy Hash: 69d5291e15693288b4d3e9b4f6d1ae394db74f315fb7dff35188cd3ac97623b5
                                                                                    • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                                                                                    • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                                                                                    • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                                                                                    • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                                                                                    Strings
                                                                                    • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                    • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                    • API String ID: 3024135584-2418719853
                                                                                    • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                                    • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                                                                    • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                                    • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 092d045fd4dfbc3abfb12b6361b7e91f54830b77947eddd119647d88fc19d888
                                                                                    • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                                                                    • Opcode Fuzzy Hash: 092d045fd4dfbc3abfb12b6361b7e91f54830b77947eddd119647d88fc19d888
                                                                                    • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                                                                    APIs
                                                                                      • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                                                                    • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                                                                    • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                                                                    • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                                                                    • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                                                                    • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                                                    • String ID:
                                                                                    • API String ID: 3525466593-0
                                                                                    • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                                    • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                                                                    • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                                    • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(00000000), ref: 00403E8A
                                                                                      • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: H_prologSleep
                                                                                    • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera
                                                                                    • API String ID: 3469354165-3547787478
                                                                                    • Opcode ID: 77232434b18b5069c12b76e6aea52a85832cd5f6f7b172050c30278deb03f7da
                                                                                    • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                                                                                    • Opcode Fuzzy Hash: 77232434b18b5069c12b76e6aea52a85832cd5f6f7b172050c30278deb03f7da
                                                                                    • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                                                                                    APIs
                                                                                      • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                                                                      • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                                                                      • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                      • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                    • String ID:
                                                                                    • API String ID: 4269425633-0
                                                                                    • Opcode ID: a8ece4ebeb7a9144728d6c63984919d5d106fe42d189668c500d9b33e9603798
                                                                                    • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                                                                    • Opcode Fuzzy Hash: a8ece4ebeb7a9144728d6c63984919d5d106fe42d189668c500d9b33e9603798
                                                                                    • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                    • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                                                                    • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                    • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53), ref: 0044FF20
                                                                                    • __alloca_probe_16.LIBCMT ref: 0044FF58
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?), ref: 0044FFA9
                                                                                    • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?,00000002,?), ref: 0044FFBB
                                                                                    • __freea.LIBCMT ref: 0044FFC4
                                                                                      • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433627,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B31
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                    • String ID:
                                                                                    • API String ID: 313313983-0
                                                                                    • Opcode ID: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                                                                                    • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                                                                                    • Opcode Fuzzy Hash: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                                                                                    • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                                                                      • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433627,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B31
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                                                                    • _free.LIBCMT ref: 0044E1A0
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                    • String ID:
                                                                                    • API String ID: 336800556-0
                                                                                    • Opcode ID: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                                                                                    • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                                                                    • Opcode Fuzzy Hash: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                                                                                    • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 0044F7B5
                                                                                      • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                    • _free.LIBCMT ref: 0044F7C7
                                                                                    • _free.LIBCMT ref: 0044F7D9
                                                                                    • _free.LIBCMT ref: 0044F7EB
                                                                                    • _free.LIBCMT ref: 0044F7FD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                    • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                                                                    • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                    • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 00443305
                                                                                      • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                    • _free.LIBCMT ref: 00443317
                                                                                    • _free.LIBCMT ref: 0044332A
                                                                                    • _free.LIBCMT ref: 0044333B
                                                                                    • _free.LIBCMT ref: 0044334C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                    • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                                                                    • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                    • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                                                                    APIs
                                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                                                                    • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                                                                    • IsWindowVisible.USER32(?), ref: 004167A1
                                                                                      • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                      • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ProcessWindow$Open$TextThreadVisible
                                                                                    • String ID: (FG
                                                                                    • API String ID: 3142014140-2273637114
                                                                                    • Opcode ID: 607526f112e17427a31f5b56122f11ff0ab10228c70398c3f3df6680815a4030
                                                                                    • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                                                                    • Opcode Fuzzy Hash: 607526f112e17427a31f5b56122f11ff0ab10228c70398c3f3df6680815a4030
                                                                                    • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                                                                    APIs
                                                                                    • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                                      • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                      • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                      • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                                                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                                    • String ID: XCG$`AG$>G
                                                                                    • API String ID: 2334542088-2372832151
                                                                                    • Opcode ID: 2716921538839e342daff3c3521be47be88ec471014256f4058dc288766d5c81
                                                                                    • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                                                                    • Opcode Fuzzy Hash: 2716921538839e342daff3c3521be47be88ec471014256f4058dc288766d5c81
                                                                                    • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                                                                    APIs
                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\eBHn6qHPLz.exe,00000104), ref: 00442714
                                                                                    • _free.LIBCMT ref: 004427DF
                                                                                    • _free.LIBCMT ref: 004427E9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$FileModuleName
                                                                                    • String ID: C:\Users\user\Desktop\eBHn6qHPLz.exe
                                                                                    • API String ID: 2506810119-3091322466
                                                                                    • Opcode ID: ae9165eb27f4f845c69520f3dc3d45a64db1a1f113bc22466fc6999e8739498b
                                                                                    • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                                                                    • Opcode Fuzzy Hash: ae9165eb27f4f845c69520f3dc3d45a64db1a1f113bc22466fc6999e8739498b
                                                                                    • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                                                                    APIs
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                                      • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                      • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                    • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                    • String ID: /sort "Visit Time" /stext "$8>G
                                                                                    • API String ID: 368326130-2663660666
                                                                                    • Opcode ID: edea57b5e34eaaa5da5d70a72ab718a8cdf03d7385d89e8a5948a328fb77c3d7
                                                                                    • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                                                                    • Opcode Fuzzy Hash: edea57b5e34eaaa5da5d70a72ab718a8cdf03d7385d89e8a5948a328fb77c3d7
                                                                                    • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                                                                    APIs
                                                                                      • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5CE
                                                                                    • ShellExecuteW.SHELL32(?,open,00000000), ref: 0040C632
                                                                                    • ExitProcess.KERNEL32 ref: 0040C63E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateExecuteExitFileProcessShell
                                                                                    • String ID: fso.DeleteFile(Wscript.ScriptFullName)$open
                                                                                    • API String ID: 2309964880-3562070623
                                                                                    • Opcode ID: f6cb5f10f057a7ed17e9dcfd0d671b7c6e641e8dfae1636d95534921db42489c
                                                                                    • Instruction ID: 568fed376c07edf90cd2df9b8610832c68d616ac56d6d0e00b2c9eff25916ff3
                                                                                    • Opcode Fuzzy Hash: f6cb5f10f057a7ed17e9dcfd0d671b7c6e641e8dfae1636d95534921db42489c
                                                                                    • Instruction Fuzzy Hash: 692145315042405AC324FB25E8969BF77E4AFD1319F50493FF482620F2EF38AA49C69A
                                                                                    APIs
                                                                                    • CreateThread.KERNEL32(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                                                                    • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 00409946
                                                                                      • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                      • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateThread$LocalTimewsprintf
                                                                                    • String ID: Offline Keylogger Started
                                                                                    • API String ID: 465354869-4114347211
                                                                                    • Opcode ID: 28ff2dcad9717e982b9b16554466c7c7fb7e9945f492f3dc52233a725b10b16a
                                                                                    • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                                                                    • Opcode Fuzzy Hash: 28ff2dcad9717e982b9b16554466c7c7fb7e9945f492f3dc52233a725b10b16a
                                                                                    • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                                                                                    APIs
                                                                                      • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                      • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                                                                    • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateThread$LocalTime$wsprintf
                                                                                    • String ID: Online Keylogger Started
                                                                                    • API String ID: 112202259-1258561607
                                                                                    • Opcode ID: 01f6288789459ca5fb14399c0173c3744ddd8ef9fce30a777e7adbd1c4e9230e
                                                                                    • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                                                                                    • Opcode Fuzzy Hash: 01f6288789459ca5fb14399c0173c3744ddd8ef9fce30a777e7adbd1c4e9230e
                                                                                    • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                                                                    APIs
                                                                                    • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                                                                                    • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                                                                                    • __dosmaperr.LIBCMT ref: 0044AAFE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                    • String ID: `@
                                                                                    • API String ID: 2583163307-951712118
                                                                                    • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                    • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                                                                                    • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                    • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                                                    • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseEventHandleObjectSingleWait
                                                                                    • String ID: Connection Timeout
                                                                                    • API String ID: 2055531096-499159329
                                                                                    • Opcode ID: efb28abd4f03fcd2daed88ec778dc0db1ac548632f8822b136dfc55cfdaa85b0
                                                                                    • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                                                                                    • Opcode Fuzzy Hash: efb28abd4f03fcd2daed88ec778dc0db1ac548632f8822b136dfc55cfdaa85b0
                                                                                    • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                                                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                                                                      • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                                                                      • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                    • String ID: bad locale name
                                                                                    • API String ID: 3628047217-1405518554
                                                                                    • Opcode ID: bd0a6a6dae6415356e731995008518494c413937943f369f1725fb776b78fea2
                                                                                    • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                                                                                    • Opcode Fuzzy Hash: bd0a6a6dae6415356e731995008518494c413937943f369f1725fb776b78fea2
                                                                                    • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                                                                                    APIs
                                                                                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExecuteShell
                                                                                    • String ID: /C $cmd.exe$open
                                                                                    • API String ID: 587946157-3896048727
                                                                                    • Opcode ID: efd00babb5e2daa966760ac71b8731e5bc1663ddc7a4c5048c359fb97f21c829
                                                                                    • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                                                                    • Opcode Fuzzy Hash: efd00babb5e2daa966760ac71b8731e5bc1663ddc7a4c5048c359fb97f21c829
                                                                                    • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                                                                    APIs
                                                                                    • TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                    • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                    • TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: TerminateThread$HookUnhookWindows
                                                                                    • String ID: pth_unenc
                                                                                    • API String ID: 3123878439-4028850238
                                                                                    • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                    • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                                                                    • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                    • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: GetCursorInfo$User32.dll
                                                                                    • API String ID: 1646373207-2714051624
                                                                                    • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                                    • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                                                                                    • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                                    • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: GetLastInputInfo$User32.dll
                                                                                    • API String ID: 2574300362-1519888992
                                                                                    • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                                    • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                                                                                    • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                                    • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __alldvrm$_strrchr
                                                                                    • String ID:
                                                                                    • API String ID: 1036877536-0
                                                                                    • Opcode ID: 04a0325834f843994ade633b459a1d3cb356a39676a395bc181b674f0ba6452b
                                                                                    • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                                                                                    • Opcode Fuzzy Hash: 04a0325834f843994ade633b459a1d3cb356a39676a395bc181b674f0ba6452b
                                                                                    • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d8b583558f75d554b20f0fedcbaebc1f151a0833ef22d7844c2f17114d5a19f4
                                                                                    • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                                                                    • Opcode Fuzzy Hash: d8b583558f75d554b20f0fedcbaebc1f151a0833ef22d7844c2f17114d5a19f4
                                                                                    • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                                                                    APIs
                                                                                    Strings
                                                                                    • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                                                    • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Sleep
                                                                                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                    • API String ID: 3472027048-1236744412
                                                                                    • Opcode ID: 1df7c091016a6e004a85cd617cd69837d5758d709d8df7b52e8ed04639c52f94
                                                                                    • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                                                                                    • Opcode Fuzzy Hash: 1df7c091016a6e004a85cd617cd69837d5758d709d8df7b52e8ed04639c52f94
                                                                                    • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                                                                                    APIs
                                                                                      • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                      • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                      • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                    • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQuerySleepValue
                                                                                    • String ID: @CG$exepath$BG
                                                                                    • API String ID: 4119054056-3221201242
                                                                                    • Opcode ID: 6a250457707edca1acedd13ec3ca0082f92bf78a10e43e74cbf2ccc6be57626a
                                                                                    • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                                                                    • Opcode Fuzzy Hash: 6a250457707edca1acedd13ec3ca0082f92bf78a10e43e74cbf2ccc6be57626a
                                                                                    • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                                                                    APIs
                                                                                      • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                                                                      • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                                                                      • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                                                                                    • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                                                    • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Window$SleepText$ForegroundLength
                                                                                    • String ID: [ $ ]
                                                                                    • API String ID: 3309952895-93608704
                                                                                    • Opcode ID: ebd93478415d7ceaf08988c946588b0e8d461d13856b31c8a019e387675c6f26
                                                                                    • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                                                                                    • Opcode Fuzzy Hash: ebd93478415d7ceaf08988c946588b0e8d461d13856b31c8a019e387675c6f26
                                                                                    • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5CE
                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B5EB
                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B5FF
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041B60C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseCreateHandlePointerWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3604237281-0
                                                                                    • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                    • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                                                                    • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                    • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                                    • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                                                                                    • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                                    • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                                    • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                                                                                    • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                                    • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                                                                                    APIs
                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                                                                      • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                                                                      • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                                                                    • _UnwindNestedFrames.LIBCMT ref: 00438124
                                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                    • String ID:
                                                                                    • API String ID: 737400349-0
                                                                                    • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                    • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                                                                    • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                    • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00414BBD,00000000,00000000,?,004471B7,00414BBD,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                                                                    • GetLastError.KERNEL32(?,004471B7,00414BBD,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,00414BBD,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 3177248105-0
                                                                                    • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                    • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                                                                    • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                    • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B647
                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B66C
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041B67A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseCreateHandleReadSize
                                                                                    • String ID:
                                                                                    • API String ID: 3919263394-0
                                                                                    • Opcode ID: ec720e96a51d184a4cda6b10cf2afb75cf85eefae2366cccc72a2835be63d5f5
                                                                                    • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                                                                    • Opcode Fuzzy Hash: ec720e96a51d184a4cda6b10cf2afb75cf85eefae2366cccc72a2835be63d5f5
                                                                                    • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                                                                    APIs
                                                                                    • GetSystemMetrics.USER32(0000004C), ref: 00418519
                                                                                    • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                                                                                    • GetSystemMetrics.USER32(0000004E), ref: 00418525
                                                                                    • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem
                                                                                    • String ID:
                                                                                    • API String ID: 4116985748-0
                                                                                    • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                                    • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                                                                                    • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                                    • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                                                                                    APIs
                                                                                    • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseHandleOpenProcess
                                                                                    • String ID:
                                                                                    • API String ID: 39102293-0
                                                                                    • Opcode ID: b8726634bc2d24e9c2e2bc3987753934be5434803c47aebb3633f4ceaff1eb89
                                                                                    • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                                                                    • Opcode Fuzzy Hash: b8726634bc2d24e9c2e2bc3987753934be5434803c47aebb3633f4ceaff1eb89
                                                                                    • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                                                                    APIs
                                                                                    • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorHandling__start
                                                                                    • String ID: pow
                                                                                    • API String ID: 3213639722-2276729525
                                                                                    • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                                    • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                                                                                    • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                                    • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Info
                                                                                    • String ID: $fD
                                                                                    • API String ID: 1807457897-3092946448
                                                                                    • Opcode ID: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                                                                    • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                                                                    • Opcode Fuzzy Hash: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                                                                    • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                                                                    APIs
                                                                                    • GetACP.KERNEL32(?,20001004,?,00000002), ref: 004509B9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ACP$OCP
                                                                                    • API String ID: 0-711371036
                                                                                    • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                    • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                                                                    • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                    • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                                                                    APIs
                                                                                    • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                                                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                    • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                                                                    Strings
                                                                                    • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LocalTime
                                                                                    • String ID: KeepAlive | Enabled | Timeout:
                                                                                    • API String ID: 481472006-1507639952
                                                                                    • Opcode ID: 09d882b1dc99b13c7e5f4f13e7c33f93e35d9e1ec55fb4edcfc6e1ad51680ac6
                                                                                    • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                                                                                    • Opcode Fuzzy Hash: 09d882b1dc99b13c7e5f4f13e7c33f93e35d9e1ec55fb4edcfc6e1ad51680ac6
                                                                                    • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                                                                                    APIs
                                                                                    • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LocalTime
                                                                                    • String ID: | $%02i:%02i:%02i:%03i
                                                                                    • API String ID: 481472006-2430845779
                                                                                    • Opcode ID: f6986e08bd7e66e2967d8d460b861fba7809280f394f75ac990cacab900edb8c
                                                                                    • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                                                                                    • Opcode Fuzzy Hash: f6986e08bd7e66e2967d8d460b861fba7809280f394f75ac990cacab900edb8c
                                                                                    • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                                                                                    APIs
                                                                                    • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExistsFilePath
                                                                                    • String ID: alarm.wav$xIG
                                                                                    • API String ID: 1174141254-4080756945
                                                                                    • Opcode ID: 72b70c96719f5035a3c9ba4e6dbf6e7fe05101607f8e3ce1aac65a6965044059
                                                                                    • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                                                                                    • Opcode Fuzzy Hash: 72b70c96719f5035a3c9ba4e6dbf6e7fe05101607f8e3ce1aac65a6965044059
                                                                                    • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                                                                                    APIs
                                                                                      • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                      • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                    • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                                                    • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                    • String ID: Online Keylogger Stopped
                                                                                    • API String ID: 1623830855-1496645233
                                                                                    • Opcode ID: 9a68afb08add550627a18c8b719e12edaca9cdc6b10f6e295761108688cdc467
                                                                                    • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                                                                                    • Opcode Fuzzy Hash: 9a68afb08add550627a18c8b719e12edaca9cdc6b10f6e295761108688cdc467
                                                                                    • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                                                                                    APIs
                                                                                    • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                                                                    • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: wave$BufferHeaderPrepare
                                                                                    • String ID: T=G
                                                                                    • API String ID: 2315374483-379896819
                                                                                    • Opcode ID: 681d1aa608717ae782e0e359d0672b86d60b3e506acf780633a0be7ede32c365
                                                                                    • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                                                                    • Opcode Fuzzy Hash: 681d1aa608717ae782e0e359d0672b86d60b3e506acf780633a0be7ede32c365
                                                                                    • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                                                                    APIs
                                                                                    • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LocaleValid
                                                                                    • String ID: IsValidLocaleName$j=D
                                                                                    • API String ID: 1901932003-3128777819
                                                                                    • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                    • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                                                                    • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                    • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID: T=G$T=G
                                                                                    • API String ID: 3519838083-3732185208
                                                                                    • Opcode ID: d35d56db29c3f898e339c7594dbfd576fe9197a4ca502cfea50645c21fb802bf
                                                                                    • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                                                                                    • Opcode Fuzzy Hash: d35d56db29c3f898e339c7594dbfd576fe9197a4ca502cfea50645c21fb802bf
                                                                                    • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                                                                                    APIs
                                                                                    • GetKeyState.USER32(00000011), ref: 0040AD5B
                                                                                      • Part of subcall function 00409B10: GetForegroundWindow.USER32 ref: 00409B3F
                                                                                      • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                      • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                      • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                      • Part of subcall function 00409B10: GetKeyboardState.USER32(?), ref: 00409B67
                                                                                      • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                      • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                      • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                    • String ID: [AltL]$[AltR]
                                                                                    • API String ID: 2738857842-2658077756
                                                                                    • Opcode ID: e4783406b8090f957eb699ebcca1d9f5d1236a3a3c59c967461c79b8c7bb50b0
                                                                                    • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                                                                    • Opcode Fuzzy Hash: e4783406b8090f957eb699ebcca1d9f5d1236a3a3c59c967461c79b8c7bb50b0
                                                                                    • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 00448825
                                                                                      • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorFreeHeapLast_free
                                                                                    • String ID: `@$`@
                                                                                    • API String ID: 1353095263-20545824
                                                                                    • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                    • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                                                                                    • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                    • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                                                                                    APIs
                                                                                    • GetKeyState.USER32(00000012), ref: 0040ADB5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: State
                                                                                    • String ID: [CtrlL]$[CtrlR]
                                                                                    • API String ID: 1649606143-2446555240
                                                                                    • Opcode ID: 1a2acc7ae96ea6d3970b85c1ad092b7db079889dc64632d6b42e586a77c2ffe8
                                                                                    • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                                                                    • Opcode Fuzzy Hash: 1a2acc7ae96ea6d3970b85c1ad092b7db079889dc64632d6b42e586a77c2ffe8
                                                                                    • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                                                                    APIs
                                                                                    • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004742E0,004742F8,?,pth_unenc), ref: 00412988
                                                                                    • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412998
                                                                                    Strings
                                                                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DeleteOpenValue
                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                    • API String ID: 2654517830-1051519024
                                                                                    • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                    • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                                                                    • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                    • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                                                                    APIs
                                                                                    • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                                                                    • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DeleteDirectoryFileRemove
                                                                                    • String ID: pth_unenc
                                                                                    • API String ID: 3325800564-4028850238
                                                                                    • Opcode ID: 058bd8072921940ac6c17e91e9c154a8c4f0c918009ed77795babcdc161dd952
                                                                                    • Instruction ID: b68931c7331ddc333ece9e06749e281aefc344294653c9eba2f2de372e339d66
                                                                                    • Opcode Fuzzy Hash: 058bd8072921940ac6c17e91e9c154a8c4f0c918009ed77795babcdc161dd952
                                                                                    • Instruction Fuzzy Hash: FEE046715112108BC610AB31EC44AEBB398AB05316F00487FF8D3A36A1DE38A988CA98
                                                                                    APIs
                                                                                    • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                    • WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ObjectProcessSingleTerminateWait
                                                                                    • String ID: pth_unenc
                                                                                    • API String ID: 1872346434-4028850238
                                                                                    • Opcode ID: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                    • Instruction ID: 4302d9c34f7b4dbdac7fc8682473a51625df35810590c52ad239c14707b44b4b
                                                                                    • Opcode Fuzzy Hash: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                    • Instruction Fuzzy Hash: C1D0C938559211AFD7614B68BC08B453B6AA745222F108277F828413F1C72598A4AE1C
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                                                                                    • GetLastError.KERNEL32 ref: 0043FB02
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4150825304.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_eBHn6qHPLz.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1717984340-0
                                                                                    • Opcode ID: 641cf42bdd343eb89e62379c4a250951f72419ef29a502270e4b2a68cd87e0bf
                                                                                    • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                                                                    • Opcode Fuzzy Hash: 641cf42bdd343eb89e62379c4a250951f72419ef29a502270e4b2a68cd87e0bf
                                                                                    • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759