Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SC_TR126089907.exe

Overview

General Information

Sample name:SC_TR126089907.exe
Analysis ID:1564532
MD5:d8f15666d25a32702106b56dfd962cd6
SHA1:b680052ba6f10f87595df8e6f06065546109c9e2
SHA256:b0724a50f077a8652bbe0972e059aadde07ea247057e239b8b28ed720a083ae8
Tags:exegeorouuser-NDA0E
Infos:

Detection

Remcos, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Uses dynamic DNS services
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • SC_TR126089907.exe (PID: 7448 cmdline: "C:\Users\user\Desktop\SC_TR126089907.exe" MD5: D8F15666D25A32702106B56DFD962CD6)
    • SC_TR126089907.exe (PID: 7580 cmdline: "C:\Users\user\Desktop\SC_TR126089907.exe" MD5: D8F15666D25A32702106B56DFD962CD6)
    • SC_TR126089907.exe (PID: 7588 cmdline: "C:\Users\user\Desktop\SC_TR126089907.exe" MD5: D8F15666D25A32702106B56DFD962CD6)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["yayabeloo.duckdns.org:6847:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-VPA6N9", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.4145108532.00000000028DF000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000002.1686220574.0000000005660000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              Click to see the 28 entries
              SourceRuleDescriptionAuthorStrings
              0.2.SC_TR126089907.exe.5660000.4.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.SC_TR126089907.exe.5660000.4.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  3.2.SC_TR126089907.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    3.2.SC_TR126089907.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                      3.2.SC_TR126089907.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                        Click to see the 32 entries

                        Stealing of Sensitive Information

                        barindex
                        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SC_TR126089907.exe, ProcessId: 7588, TargetFilename: C:\ProgramData\remcos\logs.dat
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-28T13:51:59.119761+010020365941Malware Command and Control Activity Detected192.168.2.449732135.148.195.2486847TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-28T13:52:01.567150+010028033043Unknown Traffic192.168.2.449734178.237.33.5080TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: SC_TR126089907.exeAvira: detected
                        Source: yayabeloo.duckdns.orgAvira URL Cloud: Label: malware
                        Source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["yayabeloo.duckdns.org:6847:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-VPA6N9", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                        Source: SC_TR126089907.exeReversingLabs: Detection: 52%
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.4145108532.00000000028DF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7448, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7588, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: SC_TR126089907.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_0043293A
                        Source: SC_TR126089907.exe, 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_7cec0095-2

                        Exploits

                        barindex
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7448, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7588, type: MEMORYSTR

                        Privilege Escalation

                        barindex
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00406764 _wcslen,CoGetObject,3_2_00406764
                        Source: SC_TR126089907.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: SC_TR126089907.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040B335
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,3_2_0041B42F
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040B53A
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,3_2_004089A9
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00406AC2 FindFirstFileW,FindNextFileW,3_2_00406AC2
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,3_2_00407A8C
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00418C69
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,3_2_00408DA7
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00406F06
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 4x nop then jmp 06F2BA60h0_2_06F2B16B

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49732 -> 135.148.195.248:6847
                        Source: Malware configuration extractorURLs: yayabeloo.duckdns.org
                        Source: unknownDNS query: name: yayabeloo.duckdns.org
                        Source: global trafficTCP traffic: 192.168.2.4:49732 -> 135.148.195.248:6847
                        Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                        Source: Joe Sandbox ViewIP Address: 135.148.195.248 135.148.195.248
                        Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                        Source: Joe Sandbox ViewASN Name: AVAYAUS AVAYAUS
                        Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49734 -> 178.237.33.50:80
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004260F7 recv,3_2_004260F7
                        Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                        Source: global trafficDNS traffic detected: DNS query: yayabeloo.duckdns.org
                        Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                        Source: SC_TR126089907.exe, 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, SC_TR126089907.exe, 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, SC_TR126089907.exe, 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, SC_TR126089907.exe, 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp=
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpQQJ
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpzb
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/son.gp
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                        Source: SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                        Source: SC_TR126089907.exeString found in binary or memory: https://api.particle.io/v1/devices/13300350003473433373737385/digitalread?access_token=Q235ad2c91cac

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000003_2_004099E4
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\SC_TR126089907.exeJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004159C6
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004159C6
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004159C6
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,3_2_00409B10
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7448, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7588, type: MEMORYSTR

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.4145108532.00000000028DF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7448, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7588, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041BB71 SystemParametersInfoW,3_2_0041BB71
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041BB77 SystemParametersInfoW,3_2_0041BB77

                        System Summary

                        barindex
                        Source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0.2.SC_TR126089907.exe.469dd78.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0.2.SC_TR126089907.exe.469dd78.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0.2.SC_TR126089907.exe.3c5b480.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0.2.SC_TR126089907.exe.3c5b480.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: SC_TR126089907.exe PID: 7448, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: SC_TR126089907.exe PID: 7588, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,3_2_004158B9
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_02A243E80_2_02A243E8
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_02A2E0940_2_02A2E094
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_02A2705A0_2_02A2705A
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_051301300_2_05130130
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_051301210_2_05130121
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_0513E9D80_2_0513E9D8
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_0513E9C80_2_0513E9C8
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_0572F7880_2_0572F788
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_057241C40_2_057241C4
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_05726D330_2_05726D33
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_0572F7780_2_0572F778
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_057200400_2_05720040
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_0572C8400_2_0572C840
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_0572C8300_2_0572C830
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_0572CAD80_2_0572CAD8
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_0572CAC70_2_0572CAC7
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_06F274580_2_06F27458
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_06F2E2E00_2_06F2E2E0
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_06F270200_2_06F27020
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_06F2701D0_2_06F2701D
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_06F28F680_2_06F28F68
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_06F28B300_2_06F28B30
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_06F278900_2_06F27890
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_06F278800_2_06F27880
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041D0713_2_0041D071
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004520D23_2_004520D2
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0043D0983_2_0043D098
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004371503_2_00437150
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004361AA3_2_004361AA
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004262543_2_00426254
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004313773_2_00431377
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0043651C3_2_0043651C
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041E5DF3_2_0041E5DF
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0044C7393_2_0044C739
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004367C63_2_004367C6
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004267CB3_2_004267CB
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0043C9DD3_2_0043C9DD
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00432A493_2_00432A49
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00436A8D3_2_00436A8D
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0043CC0C3_2_0043CC0C
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00436D483_2_00436D48
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00434D223_2_00434D22
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00426E733_2_00426E73
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00440E203_2_00440E20
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0043CE3B3_2_0043CE3B
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00412F453_2_00412F45
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00452F003_2_00452F00
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00426FAD3_2_00426FAD
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: String function: 004020E7 appears 40 times
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: String function: 00401F66 appears 50 times
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: String function: 004338A5 appears 41 times
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: String function: 00433FB0 appears 55 times
                        Source: SC_TR126089907.exe, 00000000.00000002.1687288169.0000000007730000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs SC_TR126089907.exe
                        Source: SC_TR126089907.exe, 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs SC_TR126089907.exe
                        Source: SC_TR126089907.exe, 00000000.00000002.1682721491.0000000000E1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SC_TR126089907.exe
                        Source: SC_TR126089907.exe, 00000000.00000002.1682721491.0000000000E53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHDWC.e vs SC_TR126089907.exe
                        Source: SC_TR126089907.exe, 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs SC_TR126089907.exe
                        Source: SC_TR126089907.exe, 00000000.00000000.1663893707.00000000008A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHDWC.exeF vs SC_TR126089907.exe
                        Source: SC_TR126089907.exe, 00000000.00000002.1686220574.0000000005660000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs SC_TR126089907.exe
                        Source: SC_TR126089907.exe, 00000000.00000002.1683402498.0000000002BA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs SC_TR126089907.exe
                        Source: SC_TR126089907.exeBinary or memory string: OriginalFilenameHDWC.exeF vs SC_TR126089907.exe
                        Source: SC_TR126089907.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0.2.SC_TR126089907.exe.469dd78.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0.2.SC_TR126089907.exe.469dd78.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0.2.SC_TR126089907.exe.3c5b480.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0.2.SC_TR126089907.exe.3c5b480.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: SC_TR126089907.exe PID: 7448, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: SC_TR126089907.exe PID: 7588, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: SC_TR126089907.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, ieVeMH0Lc5HkI5DRB0.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, SuuhDHbWClSvLY8UhZ.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, SuuhDHbWClSvLY8UhZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, SuuhDHbWClSvLY8UhZ.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, ieVeMH0Lc5HkI5DRB0.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, SuuhDHbWClSvLY8UhZ.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, SuuhDHbWClSvLY8UhZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, SuuhDHbWClSvLY8UhZ.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                        Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@5/3@2/2
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,3_2_00416AB7
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,3_2_0040E219
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,3_2_0041A63F
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_00419BC4
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SC_TR126089907.exe.logJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMutant created: NULL
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-VPA6N9
                        Source: SC_TR126089907.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: SC_TR126089907.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: SC_TR126089907.exeReversingLabs: Detection: 52%
                        Source: unknownProcess created: C:\Users\user\Desktop\SC_TR126089907.exe "C:\Users\user\Desktop\SC_TR126089907.exe"
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess created: C:\Users\user\Desktop\SC_TR126089907.exe "C:\Users\user\Desktop\SC_TR126089907.exe"
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess created: C:\Users\user\Desktop\SC_TR126089907.exe "C:\Users\user\Desktop\SC_TR126089907.exe"
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess created: C:\Users\user\Desktop\SC_TR126089907.exe "C:\Users\user\Desktop\SC_TR126089907.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess created: C:\Users\user\Desktop\SC_TR126089907.exe "C:\Users\user\Desktop\SC_TR126089907.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: iconcodecservice.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: SC_TR126089907.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: SC_TR126089907.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: SC_TR126089907.exeStatic file information: File size 1132032 > 1048576
                        Source: SC_TR126089907.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10e800
                        Source: SC_TR126089907.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: 0.2.SC_TR126089907.exe.5660000.4.raw.unpack, kAOj1Y7pfP90kycNNw.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, SuuhDHbWClSvLY8UhZ.cs.Net Code: v87NBY32BFNRB4879Rh System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, SuuhDHbWClSvLY8UhZ.cs.Net Code: v87NBY32BFNRB4879Rh System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.SC_TR126089907.exe.5660000.4.raw.unpack, GtaAIbrHXObmMm8GPA.cs.Net Code: vaH8QmOOp System.Reflection.Assembly.Load(byte[])
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041BCE3
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 0_2_02A2E248 push eax; retf 050Ah0_2_02A2E281
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004567E0 push eax; ret 3_2_004567FE
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0045B9DD push esi; ret 3_2_0045B9E6
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00455EAF push ecx; ret 3_2_00455EC2
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00433FF6 push ecx; ret 3_2_00434009
                        Source: SC_TR126089907.exeStatic PE information: section name: .text entropy: 7.887615084166011
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, LsMrg2l7FpfODhT1ObP.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bS6Yigfmkj', 'KbhY5UKuJW', 'fmbY62CdXl', 'Xi1YYXKMGG', 'q4XYAlIWvC', 'Ex4Y32VDbX', 'EXLYUk2t9d'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, zKn8GhaUohUWehKpFU.csHigh entropy of concatenated method names: 'l4rV5F62L', 'yTmtrEdqj', 'hO5ftBljf', 'qitGAGggd', 'Xhfd53bTr', 'dHZ9SqTrv', 'EYZxFAILlpESBSb2yL', 'eucn7Botghero7sFqo', 'c2RWF5qGY', 'TDr5FiNHg'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, mvOHOBBP4TbitwaQLv.csHigh entropy of concatenated method names: 'JsgiORwhn6', 'dpjiPU5CQP', 'AfGisV5x3v', 'FRRi4K7Qaf', 'RsgiNjBdUU', 'O6ZiXURolJ', 'QIVixBAx18', 'knCiKeZwwZ', 'Cf6ikaAO01', 'GjTic6ppmB'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, vqE1B7qY0dEGDRyFYC.csHigh entropy of concatenated method names: 'z0rMclsE44', 'Ha0MFgXq6P', 'tyYMqGLvoS', 'mnSMR5jjPU', 'pjYMPRdpcQ', 'dBvMsUHPd7', 'RBtM4HFJIe', 'o8cMNx1e0y', 'VabMX1BHlc', 'SVJMxCDQXA'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, c0Gwr3QG896IkObv3n.csHigh entropy of concatenated method names: 'cmYe0Zbwur', 'bi8edOVWcx', 'emVeO0sWHx', 'nGcePeRKTL', 'zIve4TQeXa', 'hdNeNC5t4x', 'nmSexsKXEx', 'gr9eKBixTR', 'sygec22YSq', 'Sccerlmorq'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, doqtMpO7XyUx2aTZJq.csHigh entropy of concatenated method names: 'wFhC1E4t0o', 'mdCCpv7bng', 'IY3ChsAsMH', 'NO7CLJlOTa', 'NPnCbQkCLm', 'XI5hwuErG7', 'UvnhTPc1xf', 'gRAhIrYHQG', 'SPUhShkVdD', 'NVohBLPhJ6'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, W8EcNvln1w4hu35klpu.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eIW5rnVNop', 'IDH5FNaNt5', 'pPA5QAnIgi', 'tL55qMGtie', 'BGQ5R0H49h', 'T7d5gTgJyk', 'eQy5unTxe3'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, WiPvBNIo2xgRgpbX4n.csHigh entropy of concatenated method names: 'iZgiMr7c5j', 'pPPiD8UFhO', 'TtoiivOtP3', 't1Di6kFUMX', 'UVxiA3MRSJ', 'NUJiUvhZCb', 'Dispose', 'Xu4WHeZY7v', 'PA2Wp9eDn4', 'gUPWo0sMBZ'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, ieVeMH0Lc5HkI5DRB0.csHigh entropy of concatenated method names: 'mchpqQpe3A', 'I4IpRLYryC', 'iZipgrbLMR', 'riApu2mk33', 'N9spwtnoX6', 'yecpTi9r29', 'q7rpIykYEc', 'brapSEAvxQ', 'nTlpBS4cvO', 'Hsqp80yrXo'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, nDm6tr8htEsypuE6Ic.csHigh entropy of concatenated method names: 'vNM5oPZfb8', 'BE05hfYfKF', 'M985Cfvcln', 'HiJ5LiJ5Xk', 'inh5iiYKKd', 'lu35bpPEJi', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, vS6MewkoI8o5WDgnqs.csHigh entropy of concatenated method names: 'kueLmTM5Im', 'migLZQbYdy', 'wtQLV8GlMh', 'XlvLtgQfln', 'TEpL2BDLW7', 'z6SLfSCXqm', 'PPNLGpyxEH', 'GYDL0DBHF9', 'd19LdXLoh8', 't00L92DJMZ'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, inr4wPzu2UcvsFOCnC.csHigh entropy of concatenated method names: 'OPa5fmVDLQ', 'OUD50vYCd1', 'RWt5dbwhGL', 'sCn5OMC7EQ', 'z3k5POc1R5', 'BP954lNtmc', 'bbY5NZZxVb', 'IwL5UOFO8B', 'VR25my0BqL', 'E0i5ZGOsaq'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, GwjwXegS5kXB5HfXl3.csHigh entropy of concatenated method names: 'ToString', 'iGAJr9n2qo', 'u85JPFSyDm', 'H9aJsIXFU2', 'TVuJ4HuDPb', 'n1RJNUOx6Y', 'RohJX3Ynog', 'VU7JxLjgNZ', 'a6YJK6pkcD', 'nfpJkUbWhf'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, RWcWVBuDRjJw8XSRlW.csHigh entropy of concatenated method names: 't6xDvsoGvQ', 'PM5DjbDrF7', 'ToString', 'n6ODHPqh6S', 'RSXDpNXN4C', 'YMQDo4Dx6m', 'U9JDhZtSDN', 'tPVDCpTmAR', 'SdxDLOQX8w', 'fklDbBKUnu'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, vi4aKlllOnH4EO2DESX.csHigh entropy of concatenated method names: 'fWi58U9aN0', 'MNA5zkPiUu', 'Vwq6nmccmc', 'xhc6ljL2q8', 'YpW6aOkRfx', 'yBX6Esom0c', 'CWp67oroSp', 'FNp61wxt1F', 'pss6HWexZH', 'asJ6p6PvRu'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, GXQmuqx6Cx8To5bc0H.csHigh entropy of concatenated method names: 'RkjLHBLEqI', 'MWeLoYhbEY', 'JvcLCdPSHX', 'VQIC8vDAEj', 'KlHCzX92wp', 'd63LnqaWBk', 'kbcLlKgv1d', 'FBdLaiFUWL', 'UlsLENSSAw', 'K9LL73AwZP'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, KNXLnu9GdPKw11iEPf.csHigh entropy of concatenated method names: 'Akih2Nmlfu', 'xpwhGgQUQ3', 'WFposI9PLl', 'Dkxo4aEtTk', 'IIBoNs7XW4', 'JwjoXY4wHE', 'io6oxTKQph', 'n8HoKwMJgc', 'GIjokBe793', 'Rjxocumckr'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, gX1MNhT6UfHcqe5Lvy.csHigh entropy of concatenated method names: 'rHIDS1eB96', 'if0D8dv2fV', 'RE5WncgrTm', 'VjlWlWdBPI', 'rP0DrImTLP', 'ihhDFTo9Ki', 't4uDQG2yq9', 'KHGDqORw9h', 'DRiDRCigBa', 'AmJDgVHRdL'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, WyHprPdw6bZktDZcip.csHigh entropy of concatenated method names: 'aCwotU3uZk', 'uKoof9pjIB', 'c8bo0VgFlc', 'MHbodRjVe4', 'ooUoMdcdmy', 'J94oJIfxXN', 'GrMoD5uYus', 'XIgoWSOdQ3', 'NHxoi7xIvo', 'N9io5vfyEy'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, SuhYdp7nVlttTDVu4C.csHigh entropy of concatenated method names: 'cnClLeVeMH', 'jc5lbHkI5D', 'Gw6lvbZktD', 'yciljpXNXL', 'eiElMPf7oq', 'AMplJ7XyUx', 'al60oJ7LUDsET1E7rQ', 'BuQOcZUQY3xuiOFnjA', 'YoYllKyJvH', 'eSKlEVugWf'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, K446U5pMFDyfW56ITl.csHigh entropy of concatenated method names: 'Dispose', 'LgRlBgpbX4', 'AnBaPncIcZ', 'UgOMGaDpLp', 'ao0l8K12PE', 'xT5lzmpbT7', 'ProcessDialogKey', 'PbvanvOHOB', 'G4Talbitwa', 'QLvaaeDm6t'
                        Source: 0.2.SC_TR126089907.exe.3d17ca0.3.raw.unpack, SuuhDHbWClSvLY8UhZ.csHigh entropy of concatenated method names: 'aChE1jedOJ', 'pBSEH6PpAR', 'VcmEpRaT26', 'LuKEobPNTp', 'My8EhQyxmM', 'HJwECk4Qa5', 'CqDEL8rEDY', 'IJbEb29mHp', 'x9OEynw0yP', 'bsBEvOgt9M'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, LsMrg2l7FpfODhT1ObP.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bS6Yigfmkj', 'KbhY5UKuJW', 'fmbY62CdXl', 'Xi1YYXKMGG', 'q4XYAlIWvC', 'Ex4Y32VDbX', 'EXLYUk2t9d'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, zKn8GhaUohUWehKpFU.csHigh entropy of concatenated method names: 'l4rV5F62L', 'yTmtrEdqj', 'hO5ftBljf', 'qitGAGggd', 'Xhfd53bTr', 'dHZ9SqTrv', 'EYZxFAILlpESBSb2yL', 'eucn7Botghero7sFqo', 'c2RWF5qGY', 'TDr5FiNHg'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, mvOHOBBP4TbitwaQLv.csHigh entropy of concatenated method names: 'JsgiORwhn6', 'dpjiPU5CQP', 'AfGisV5x3v', 'FRRi4K7Qaf', 'RsgiNjBdUU', 'O6ZiXURolJ', 'QIVixBAx18', 'knCiKeZwwZ', 'Cf6ikaAO01', 'GjTic6ppmB'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, vqE1B7qY0dEGDRyFYC.csHigh entropy of concatenated method names: 'z0rMclsE44', 'Ha0MFgXq6P', 'tyYMqGLvoS', 'mnSMR5jjPU', 'pjYMPRdpcQ', 'dBvMsUHPd7', 'RBtM4HFJIe', 'o8cMNx1e0y', 'VabMX1BHlc', 'SVJMxCDQXA'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, c0Gwr3QG896IkObv3n.csHigh entropy of concatenated method names: 'cmYe0Zbwur', 'bi8edOVWcx', 'emVeO0sWHx', 'nGcePeRKTL', 'zIve4TQeXa', 'hdNeNC5t4x', 'nmSexsKXEx', 'gr9eKBixTR', 'sygec22YSq', 'Sccerlmorq'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, doqtMpO7XyUx2aTZJq.csHigh entropy of concatenated method names: 'wFhC1E4t0o', 'mdCCpv7bng', 'IY3ChsAsMH', 'NO7CLJlOTa', 'NPnCbQkCLm', 'XI5hwuErG7', 'UvnhTPc1xf', 'gRAhIrYHQG', 'SPUhShkVdD', 'NVohBLPhJ6'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, W8EcNvln1w4hu35klpu.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eIW5rnVNop', 'IDH5FNaNt5', 'pPA5QAnIgi', 'tL55qMGtie', 'BGQ5R0H49h', 'T7d5gTgJyk', 'eQy5unTxe3'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, WiPvBNIo2xgRgpbX4n.csHigh entropy of concatenated method names: 'iZgiMr7c5j', 'pPPiD8UFhO', 'TtoiivOtP3', 't1Di6kFUMX', 'UVxiA3MRSJ', 'NUJiUvhZCb', 'Dispose', 'Xu4WHeZY7v', 'PA2Wp9eDn4', 'gUPWo0sMBZ'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, ieVeMH0Lc5HkI5DRB0.csHigh entropy of concatenated method names: 'mchpqQpe3A', 'I4IpRLYryC', 'iZipgrbLMR', 'riApu2mk33', 'N9spwtnoX6', 'yecpTi9r29', 'q7rpIykYEc', 'brapSEAvxQ', 'nTlpBS4cvO', 'Hsqp80yrXo'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, nDm6tr8htEsypuE6Ic.csHigh entropy of concatenated method names: 'vNM5oPZfb8', 'BE05hfYfKF', 'M985Cfvcln', 'HiJ5LiJ5Xk', 'inh5iiYKKd', 'lu35bpPEJi', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, vS6MewkoI8o5WDgnqs.csHigh entropy of concatenated method names: 'kueLmTM5Im', 'migLZQbYdy', 'wtQLV8GlMh', 'XlvLtgQfln', 'TEpL2BDLW7', 'z6SLfSCXqm', 'PPNLGpyxEH', 'GYDL0DBHF9', 'd19LdXLoh8', 't00L92DJMZ'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, inr4wPzu2UcvsFOCnC.csHigh entropy of concatenated method names: 'OPa5fmVDLQ', 'OUD50vYCd1', 'RWt5dbwhGL', 'sCn5OMC7EQ', 'z3k5POc1R5', 'BP954lNtmc', 'bbY5NZZxVb', 'IwL5UOFO8B', 'VR25my0BqL', 'E0i5ZGOsaq'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, GwjwXegS5kXB5HfXl3.csHigh entropy of concatenated method names: 'ToString', 'iGAJr9n2qo', 'u85JPFSyDm', 'H9aJsIXFU2', 'TVuJ4HuDPb', 'n1RJNUOx6Y', 'RohJX3Ynog', 'VU7JxLjgNZ', 'a6YJK6pkcD', 'nfpJkUbWhf'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, RWcWVBuDRjJw8XSRlW.csHigh entropy of concatenated method names: 't6xDvsoGvQ', 'PM5DjbDrF7', 'ToString', 'n6ODHPqh6S', 'RSXDpNXN4C', 'YMQDo4Dx6m', 'U9JDhZtSDN', 'tPVDCpTmAR', 'SdxDLOQX8w', 'fklDbBKUnu'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, vi4aKlllOnH4EO2DESX.csHigh entropy of concatenated method names: 'fWi58U9aN0', 'MNA5zkPiUu', 'Vwq6nmccmc', 'xhc6ljL2q8', 'YpW6aOkRfx', 'yBX6Esom0c', 'CWp67oroSp', 'FNp61wxt1F', 'pss6HWexZH', 'asJ6p6PvRu'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, GXQmuqx6Cx8To5bc0H.csHigh entropy of concatenated method names: 'RkjLHBLEqI', 'MWeLoYhbEY', 'JvcLCdPSHX', 'VQIC8vDAEj', 'KlHCzX92wp', 'd63LnqaWBk', 'kbcLlKgv1d', 'FBdLaiFUWL', 'UlsLENSSAw', 'K9LL73AwZP'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, KNXLnu9GdPKw11iEPf.csHigh entropy of concatenated method names: 'Akih2Nmlfu', 'xpwhGgQUQ3', 'WFposI9PLl', 'Dkxo4aEtTk', 'IIBoNs7XW4', 'JwjoXY4wHE', 'io6oxTKQph', 'n8HoKwMJgc', 'GIjokBe793', 'Rjxocumckr'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, gX1MNhT6UfHcqe5Lvy.csHigh entropy of concatenated method names: 'rHIDS1eB96', 'if0D8dv2fV', 'RE5WncgrTm', 'VjlWlWdBPI', 'rP0DrImTLP', 'ihhDFTo9Ki', 't4uDQG2yq9', 'KHGDqORw9h', 'DRiDRCigBa', 'AmJDgVHRdL'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, WyHprPdw6bZktDZcip.csHigh entropy of concatenated method names: 'aCwotU3uZk', 'uKoof9pjIB', 'c8bo0VgFlc', 'MHbodRjVe4', 'ooUoMdcdmy', 'J94oJIfxXN', 'GrMoD5uYus', 'XIgoWSOdQ3', 'NHxoi7xIvo', 'N9io5vfyEy'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, SuhYdp7nVlttTDVu4C.csHigh entropy of concatenated method names: 'cnClLeVeMH', 'jc5lbHkI5D', 'Gw6lvbZktD', 'yciljpXNXL', 'eiElMPf7oq', 'AMplJ7XyUx', 'al60oJ7LUDsET1E7rQ', 'BuQOcZUQY3xuiOFnjA', 'YoYllKyJvH', 'eSKlEVugWf'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, K446U5pMFDyfW56ITl.csHigh entropy of concatenated method names: 'Dispose', 'LgRlBgpbX4', 'AnBaPncIcZ', 'UgOMGaDpLp', 'ao0l8K12PE', 'xT5lzmpbT7', 'ProcessDialogKey', 'PbvanvOHOB', 'G4Talbitwa', 'QLvaaeDm6t'
                        Source: 0.2.SC_TR126089907.exe.7730000.5.raw.unpack, SuuhDHbWClSvLY8UhZ.csHigh entropy of concatenated method names: 'aChE1jedOJ', 'pBSEH6PpAR', 'VcmEpRaT26', 'LuKEobPNTp', 'My8EhQyxmM', 'HJwECk4Qa5', 'CqDEL8rEDY', 'IJbEb29mHp', 'x9OEynw0yP', 'bsBEvOgt9M'
                        Source: 0.2.SC_TR126089907.exe.5660000.4.raw.unpack, FZaOUuOPvnEAfIAr0M.csHigh entropy of concatenated method names: 'lEA0fIAr0', 'tZCA8AZk9', 'gXO9bmMm8', 'DGw7NTeNK', 'Om2dkTqQy', 'EZYgaiyMO', 'Dispose', 'FZaOOUuPv', 'pv8tyvFJFxYXZkDera', 'y16QeXgcC0F7yngarN'
                        Source: 0.2.SC_TR126089907.exe.5660000.4.raw.unpack, GtaAIbrHXObmMm8GPA.csHigh entropy of concatenated method names: 't43wlqHDE', 'b331V9lSR', 'y0lQR8D9G', 'PPrmXmJxA', 'CF9acgM2i', 'eykiYV7wh', 'vSMVwpZMk', 'kxKJsuLoh', 'Ny8e5Nb61', 'qdOCMMDun'
                        Source: 0.2.SC_TR126089907.exe.5660000.4.raw.unpack, kAOj1Y7pfP90kycNNw.csHigh entropy of concatenated method names: 'lb2Ia3XrDtd392xi2Tb', 'XJIblTXQXnFqByJBCJm', 'uLEr9lUTy0', 'Y8R45UX8CExDEFrtuqs', 'ye0NJSX7mZWAZIVVpiG', 'WY1PxJXMKygj5Preg16', 'ELG2kXXJWTZduCJNQBl', 'RgtTUJcyZL', 'wUUrNltvEH', 'CJErdEKrT9'
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00406128 ShellExecuteW,URLDownloadToFileW,3_2_00406128
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_00419BC4
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041BCE3
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7448, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0040E54F Sleep,ExitProcess,3_2_0040E54F
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMemory allocated: 29E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMemory allocated: 4B50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMemory allocated: 92F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMemory allocated: A2F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMemory allocated: A510000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMemory allocated: B510000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,3_2_004198C2
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeWindow / User API: threadDelayed 5524Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeWindow / User API: threadDelayed 3993Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeWindow / User API: foregroundWindowGot 1771Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exe TID: 7468Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exe TID: 7632Thread sleep count: 214 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exe TID: 7632Thread sleep time: -107000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exe TID: 7636Thread sleep count: 5524 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exe TID: 7636Thread sleep time: -16572000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exe TID: 7636Thread sleep count: 3993 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exe TID: 7636Thread sleep time: -11979000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040B335
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,3_2_0041B42F
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040B53A
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,3_2_004089A9
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00406AC2 FindFirstFileW,FindNextFileW,3_2_00406AC2
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,3_2_00407A8C
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00418C69
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,3_2_00408DA7
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00406F06
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW X
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeAPI call chain: ExitProcess graph end nodegraph_3-47261
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0043A65D
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041BCE3
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00442554 mov eax, dword ptr fs:[00000030h]3_2_00442554
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0044E92E GetProcessHeap,3_2_0044E92E
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00434168
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0043A65D
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00433B44
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00433CD7 SetUnhandledExceptionFilter,3_2_00433CD7
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMemory written: C:\Users\user\Desktop\SC_TR126089907.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe3_2_00410F36
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00418754 mouse_event,3_2_00418754
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess created: C:\Users\user\Desktop\SC_TR126089907.exe "C:\Users\user\Desktop\SC_TR126089907.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeProcess created: C:\Users\user\Desktop\SC_TR126089907.exe "C:\Users\user\Desktop\SC_TR126089907.exe"Jump to behavior
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerG
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager,Q
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmp, SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager&Q
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmp, SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager~
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager'^
                        Source: SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmp, logs.dat.3.drBinary or memory string: [Program Manager]
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00433E0A cpuid 3_2_00433E0A
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: GetLocaleInfoA,3_2_0040E679
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: EnumSystemLocalesW,3_2_004470AE
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: GetLocaleInfoW,3_2_004510BA
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_004511E3
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: GetLocaleInfoW,3_2_004512EA
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_004513B7
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: GetLocaleInfoW,3_2_00447597
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,3_2_00450A7F
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: EnumSystemLocalesW,3_2_00450CF7
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: EnumSystemLocalesW,3_2_00450D42
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: EnumSystemLocalesW,3_2_00450DDD
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_00450E6A
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Users\user\Desktop\SC_TR126089907.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00404915 GetLocalTime,CreateEventA,CreateThread,3_2_00404915
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_0041A7A2 GetComputerNameExW,GetUserNameW,3_2_0041A7A2
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: 3_2_00448057 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,3_2_00448057
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.5660000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.5660000.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.2bcd374.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1686220574.0000000005660000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683402498.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.4145108532.00000000028DF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7448, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7588, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data3_2_0040B21B
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\3_2_0040B335
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: \key3.db3_2_0040B335

                        Remote Access Functionality

                        barindex
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-VPA6N9Jump to behavior
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.5660000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.5660000.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.2bcd374.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1686220574.0000000005660000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683402498.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.SC_TR126089907.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.469dd78.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SC_TR126089907.exe.3c5b480.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.4145108532.00000000028DF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7448, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: SC_TR126089907.exe PID: 7588, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Users\user\Desktop\SC_TR126089907.exeCode function: cmd.exe3_2_00405042
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        1
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services11
                        Archive Collected Data
                        12
                        Ingress Tool Transfer
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts1
                        Command and Scripting Interpreter
                        1
                        Windows Service
                        1
                        Bypass User Account Control
                        1
                        Deobfuscate/Decode Files or Information
                        211
                        Input Capture
                        1
                        Account Discovery
                        Remote Desktop Protocol211
                        Input Capture
                        2
                        Encrypted Channel
                        Exfiltration Over Bluetooth1
                        Defacement
                        Email AddressesDNS ServerDomain Accounts2
                        Service Execution
                        Logon Script (Windows)1
                        Access Token Manipulation
                        4
                        Obfuscated Files or Information
                        2
                        Credentials In Files
                        1
                        System Service Discovery
                        SMB/Windows Admin Shares3
                        Clipboard Data
                        1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                        Windows Service
                        22
                        Software Packing
                        NTDS2
                        File and Directory Discovery
                        Distributed Component Object ModelInput Capture1
                        Remote Access Software
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
                        Process Injection
                        1
                        DLL Side-Loading
                        LSA Secrets33
                        System Information Discovery
                        SSHKeylogging2
                        Non-Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Bypass User Account Control
                        Cached Domain Credentials21
                        Security Software Discovery
                        VNCGUI Input Capture22
                        Application Layer Protocol
                        Data Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Masquerading
                        DCSync31
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                        Virtualization/Sandbox Evasion
                        Proc Filesystem3
                        Process Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                        Access Token Manipulation
                        /etc/passwd and /etc/shadow1
                        Application Window Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron122
                        Process Injection
                        Network Sniffing1
                        System Owner/User Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        SC_TR126089907.exe53%ReversingLabsByteCode-MSIL.Trojan.Remcos
                        SC_TR126089907.exe100%AviraHEUR/AGEN.1307356
                        SC_TR126089907.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://api.particle.io/v1/devices/13300350003473433373737385/digitalread?access_token=Q235ad2c91cac0%Avira URL Cloudsafe
                        yayabeloo.duckdns.org100%Avira URL Cloudmalware
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        yayabeloo.duckdns.org
                        135.148.195.248
                        truetrue
                          unknown
                          geoplugin.net
                          178.237.33.50
                          truefalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            http://geoplugin.net/json.gpfalse
                              high
                              yayabeloo.duckdns.orgtrue
                              • Avira URL Cloud: malware
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://www.apache.org/licenses/LICENSE-2.0SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designersGSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/?SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/bTheSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designers?SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.tiro.comSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://api.particle.io/v1/devices/13300350003473433373737385/digitalread?access_token=Q235ad2c91cacSC_TR126089907.exefalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://geoplugin.net/son.gpSC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://www.fontbureau.com/designersSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://geoplugin.net/json.gpQQJSC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.goodfont.co.krSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://geoplugin.net/json.gpSystem32SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.carterandcone.comlSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://geoplugin.net/json.gp=SC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.sajatypeworks.comSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.typography.netDSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.fontbureau.com/designers/cabarga.htmlNSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.founder.com.cn/cn/cTheSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.galapagosdesign.com/staff/dennis.htmSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.founder.com.cn/cnSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.fontbureau.com/designers/frere-user.htmlSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://geoplugin.net/json.gp/CSC_TR126089907.exe, 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, SC_TR126089907.exe, 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, SC_TR126089907.exe, 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, SC_TR126089907.exe, 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.jiyu-kobo.co.jp/SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.galapagosdesign.com/DPleaseSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.fontbureau.com/designers8SC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://geoplugin.net/json.gpzbSC_TR126089907.exe, 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.fonts.comSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.sandoll.co.krSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.urwpp.deDPleaseSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://www.zhongyicts.com.cnSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.sakkal.comSC_TR126089907.exe, 00000000.00000002.1686615032.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            • No. of IPs < 25%
                                                                                            • 25% < No. of IPs < 50%
                                                                                            • 50% < No. of IPs < 75%
                                                                                            • 75% < No. of IPs
                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                            135.148.195.248
                                                                                            yayabeloo.duckdns.orgUnited States
                                                                                            18676AVAYAUStrue
                                                                                            178.237.33.50
                                                                                            geoplugin.netNetherlands
                                                                                            8455ATOM86-ASATOM86NLfalse
                                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                                            Analysis ID:1564532
                                                                                            Start date and time:2024-11-28 13:51:05 +01:00
                                                                                            Joe Sandbox product:CloudBasic
                                                                                            Overall analysis duration:0h 7m 37s
                                                                                            Hypervisor based Inspection enabled:false
                                                                                            Report type:full
                                                                                            Cookbook file name:default.jbs
                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                            Number of analysed new started processes analysed:8
                                                                                            Number of new started drivers analysed:0
                                                                                            Number of existing processes analysed:0
                                                                                            Number of existing drivers analysed:0
                                                                                            Number of injected processes analysed:0
                                                                                            Technologies:
                                                                                            • HCA enabled
                                                                                            • EGA enabled
                                                                                            • AMSI enabled
                                                                                            Analysis Mode:default
                                                                                            Analysis stop reason:Timeout
                                                                                            Sample name:SC_TR126089907.exe
                                                                                            Detection:MAL
                                                                                            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@5/3@2/2
                                                                                            EGA Information:
                                                                                            • Successful, ratio: 100%
                                                                                            HCA Information:
                                                                                            • Successful, ratio: 99%
                                                                                            • Number of executed functions: 77
                                                                                            • Number of non-executed functions: 191
                                                                                            Cookbook Comments:
                                                                                            • Found application associated with file extension: .exe
                                                                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                            • VT rate limit hit for: SC_TR126089907.exe
                                                                                            TimeTypeDescription
                                                                                            07:51:54API Interceptor6860977x Sleep call for process: SC_TR126089907.exe modified
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            135.148.195.248UPS_CBIJ90511770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                              UPSCBIJ99581770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                seemybesttimeforgivenmebestthingswithentiretimeforgivenmegreat.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                                  KULI500896821_PO200000035_SCAN.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                    17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                      na.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                        037002451082_10142024.xlsGet hashmaliciousRemcosBrowse
                                                                                                          QPS-36477.xlsGet hashmaliciousRemcosBrowse
                                                                                                            DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                              PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                178.237.33.50Sipari#U015f_listesi.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                Banco Santander Totta _Aconselhamento_Pagamento.imgGet hashmaliciousRemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                remi.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                rem.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                Salary Revision _pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                BUNKER INVOICE #U2018MV.SUN OCEAN.pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                1732748284fd56a2da13edf4ae4b865c44fa6834581d27eb2edbfe3fc50ef131cb95db5639506.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                173274744687e09b63aaee64ab5c6d3baa50ebd886d53d9deeef28fce7ab1e19ace8987105169.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                UPS_CBIJ90511770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                UPSCBIJ99581770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                yayabeloo.duckdns.orgUPS_CBIJ90511770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 135.148.195.248
                                                                                                                UPSCBIJ99581770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 135.148.195.248
                                                                                                                geoplugin.netSipari#U015f_listesi.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                                • 178.237.33.50
                                                                                                                Banco Santander Totta _Aconselhamento_Pagamento.imgGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                remi.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 178.237.33.50
                                                                                                                rem.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 178.237.33.50
                                                                                                                Salary Revision _pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                • 178.237.33.50
                                                                                                                BUNKER INVOICE #U2018MV.SUN OCEAN.pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                • 178.237.33.50
                                                                                                                1732748284fd56a2da13edf4ae4b865c44fa6834581d27eb2edbfe3fc50ef131cb95db5639506.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                173274744687e09b63aaee64ab5c6d3baa50ebd886d53d9deeef28fce7ab1e19ace8987105169.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                UPS_CBIJ90511770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 178.237.33.50
                                                                                                                UPSCBIJ99581770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 178.237.33.50
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                AVAYAUSarm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                • 135.76.189.218
                                                                                                                nabppc.elfGet hashmaliciousUnknownBrowse
                                                                                                                • 135.21.217.109
                                                                                                                botx.arm6.elfGet hashmaliciousMiraiBrowse
                                                                                                                • 135.63.88.87
                                                                                                                arm5.elfGet hashmaliciousUnknownBrowse
                                                                                                                • 135.70.230.249
                                                                                                                UPS_CBIJ90511770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 135.148.195.248
                                                                                                                UPSCBIJ99581770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 135.148.195.248
                                                                                                                arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                • 198.152.15.135
                                                                                                                x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                • 135.75.151.33
                                                                                                                splppc.elfGet hashmaliciousUnknownBrowse
                                                                                                                • 135.123.215.118
                                                                                                                ppc.elfGet hashmaliciousUnknownBrowse
                                                                                                                • 135.76.157.78
                                                                                                                ATOM86-ASATOM86NLSipari#U015f_listesi.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                                                                • 178.237.33.50
                                                                                                                Banco Santander Totta _Aconselhamento_Pagamento.imgGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                remi.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 178.237.33.50
                                                                                                                rem.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 178.237.33.50
                                                                                                                Salary Revision _pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                • 178.237.33.50
                                                                                                                BUNKER INVOICE #U2018MV.SUN OCEAN.pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                • 178.237.33.50
                                                                                                                1732748284fd56a2da13edf4ae4b865c44fa6834581d27eb2edbfe3fc50ef131cb95db5639506.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                173274744687e09b63aaee64ab5c6d3baa50ebd886d53d9deeef28fce7ab1e19ace8987105169.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                UPS_CBIJ90511770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 178.237.33.50
                                                                                                                UPSCBIJ99581770131.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                • 178.237.33.50
                                                                                                                No context
                                                                                                                No context
                                                                                                                Process:C:\Users\user\Desktop\SC_TR126089907.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):144
                                                                                                                Entropy (8bit):3.402054886640339
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:rhlKlf3FbQRQ55JWRal2Jl+7R0DAlBG45klovDl6v:6lf32C55YcIeeDAlOWAv
                                                                                                                MD5:188E1CF281FD55ABBB01F334C04A7809
                                                                                                                SHA1:E54DA8D9825F22981176A7F18780708EABA161D2
                                                                                                                SHA-256:B728FFE9ED7E7BF8CEDA7B3C5880B2C3B8CA21735D080B2DFCA25989B0BF396E
                                                                                                                SHA-512:AE1AA3061FC7B9657CBFEF48551D228E2055925B7D52C6BD0C82BD7CA7E821C99BAD928D9A233BF4403062FED2BA230B614CD8DD7A06A5A6814DFD77126DACA6
                                                                                                                Malicious:true
                                                                                                                Yara Hits:
                                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                                                Reputation:low
                                                                                                                Preview:....[.2.0.2.4./.1.1./.2.8. .0.7.:.5.1.:.5.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                                                Process:C:\Users\user\Desktop\SC_TR126089907.exe
                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1216
                                                                                                                Entropy (8bit):5.34331486778365
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                                Malicious:true
                                                                                                                Reputation:high, very likely benign file
                                                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                                Process:C:\Users\user\Desktop\SC_TR126089907.exe
                                                                                                                File Type:JSON data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):963
                                                                                                                Entropy (8bit):5.013758486871551
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12:tkluJnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkw7x:qluNdVauKyGX85jvXhNlT3/7AcV9Wro
                                                                                                                MD5:A0B25AA7ACE7B58B8A68A3B043CBD1A2
                                                                                                                SHA1:557B3E91B19FF73B980577D21B0759ACFB694334
                                                                                                                SHA-256:FF65B6A6CAF43C5830DA137836E99CC4F2DC511116EC72A8F180A17FCCB17526
                                                                                                                SHA-512:581BF3DEEA3713D383A87024CEA8C3B913FE1138C3D5A9D9D50854EB12DF8D8FFF3239ECB5DC21A24CD337DB7CE4655E6EB373B9524E6BBF160EAB31323CE894
                                                                                                                Malicious:false
                                                                                                                Reputation:low
                                                                                                                Preview:{. "geoplugin_request":"8.46.123.228",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Entropy (8bit):7.886043126359652
                                                                                                                TrID:
                                                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                                                File name:SC_TR126089907.exe
                                                                                                                File size:1'132'032 bytes
                                                                                                                MD5:d8f15666d25a32702106b56dfd962cd6
                                                                                                                SHA1:b680052ba6f10f87595df8e6f06065546109c9e2
                                                                                                                SHA256:b0724a50f077a8652bbe0972e059aadde07ea247057e239b8b28ed720a083ae8
                                                                                                                SHA512:0bda9df65f34d05ff4448783bd0c747631621bdea98d716f3b3fb77f6b05784efd4aa67cf55e60e966375e2590df7bb30f4651865345f0995f50fcad31458f8b
                                                                                                                SSDEEP:24576:e2xjcLCnYnIXrbmcfjyTinYxorzPMFZYXX+Wjj8GLgv:lZnYIXrbFm6YSzPwYXX+G4GL
                                                                                                                TLSH:96351260139EE502C8D71B344967E7F096688D8CE512C70BABDA7EEFBC3B5122D85391
                                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Gg..............0......\........... ... ....@.. ....................................@................................
                                                                                                                Icon Hash:099bce4dd131078e
                                                                                                                Entrypoint:0x510602
                                                                                                                Entrypoint Section:.text
                                                                                                                Digitally signed:false
                                                                                                                Imagebase:0x400000
                                                                                                                Subsystem:windows gui
                                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                Time Stamp:0x6747D6DC [Thu Nov 28 02:35:08 2024 UTC]
                                                                                                                TLS Callbacks:
                                                                                                                CLR (.Net) Version:
                                                                                                                OS Version Major:4
                                                                                                                OS Version Minor:0
                                                                                                                File Version Major:4
                                                                                                                File Version Minor:0
                                                                                                                Subsystem Version Major:4
                                                                                                                Subsystem Version Minor:0
                                                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                                Instruction
                                                                                                                jmp dword ptr [00402000h]
                                                                                                                adc dword ptr [eax], eax
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [esi], bh
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax+00h], al
                                                                                                                add byte ptr [eax], al
                                                                                                                push edi
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [ebp+00h], bl
                                                                                                                add byte ptr [eax], al
                                                                                                                pop edi
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [edx+00h], ah
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [esi], cl
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [edi], bl
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [edx], ch
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax+eax+00h], dl
                                                                                                                add byte ptr [ebx+00h], al
                                                                                                                add byte ptr [eax], al
                                                                                                                pop ebx
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax+eax+00h], ah
                                                                                                                add byte ptr [ecx], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax+eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                or dword ptr [eax], eax
                                                                                                                add byte ptr [eax], al
                                                                                                                adc eax, 1C000000h
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [ebx], dh
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [edi+00h], al
                                                                                                                add byte ptr [eax], al
                                                                                                                push eax
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [edi], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [edx], ah
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [ebx], dl
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax+eax], bh
                                                                                                                add byte ptr [eax], al
                                                                                                                sbb byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                dec ecx
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [ebx+00h], cl
                                                                                                                add byte ptr [eax], al
                                                                                                                dec edi
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                add byte ptr [eax], al
                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1105b00x4f.text
                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1120000x59f4.rsrc
                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1180000xc.reloc
                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                .text0x20000x10e6880x10e8003987ded280f91bc2a9fa0df85554716aFalse0.9423512231400185data7.887615084166011IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                .rsrc0x1120000x59f40x5a00b8e28759bef207c5b75c06bafc1bb2deFalse0.9311197916666667data7.8580027116156534IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                .reloc0x1180000xc0x2008489b87597c9ec8e22bbd7e7dd306587False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                RT_ICON0x1121000x531aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.968083106138949
                                                                                                                RT_GROUP_ICON0x11742c0x14data1.05
                                                                                                                RT_VERSION0x1174500x3a4data0.43776824034334766
                                                                                                                RT_MANIFEST0x1178040x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                                DLLImport
                                                                                                                mscoree.dll_CorExeMain
                                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                2024-11-28T13:51:59.119761+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449732135.148.195.2486847TCP
                                                                                                                2024-11-28T13:52:01.567150+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449734178.237.33.5080TCP
                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Nov 28, 2024 13:51:57.793976068 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:51:57.914328098 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:51:57.914412975 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:51:57.919990063 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:51:58.041562080 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:51:59.064313889 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:51:59.119760990 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:51:59.308154106 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:51:59.312611103 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:51:59.433373928 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:51:59.433480024 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:51:59.553472042 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:51:59.765588999 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:51:59.767136097 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:51:59.887424946 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:51:59.966754913 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:52:00.010387897 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:52:00.154190063 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:52:00.275022984 CET8049734178.237.33.50192.168.2.4
                                                                                                                Nov 28, 2024 13:52:00.275101900 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:52:00.275346994 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:52:00.397624016 CET8049734178.237.33.50192.168.2.4
                                                                                                                Nov 28, 2024 13:52:01.567095041 CET8049734178.237.33.50192.168.2.4
                                                                                                                Nov 28, 2024 13:52:01.567150116 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:52:01.915488958 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:52:02.035700083 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:52:02.566085100 CET8049734178.237.33.50192.168.2.4
                                                                                                                Nov 28, 2024 13:52:02.569101095 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:52:15.215027094 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:52:15.216541052 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:52:15.336559057 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:52:45.232814074 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:52:45.234875917 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:52:45.361749887 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:53:15.251364946 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:53:15.252948999 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:53:15.372951031 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:53:45.268702030 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:53:45.273714066 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:53:45.398107052 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:53:50.012296915 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:53:50.350703955 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:53:50.996027946 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:53:52.292829990 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:53:54.792839050 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:53:59.762562990 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:54:09.496109009 CET4973480192.168.2.4178.237.33.50
                                                                                                                Nov 28, 2024 13:54:15.285478115 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:54:15.287900925 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:54:15.408010006 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:54:45.287771940 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:54:45.289151907 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:54:45.409171104 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:55:15.305881023 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:55:15.307216883 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:55:15.427354097 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:55:45.308518887 CET684749732135.148.195.248192.168.2.4
                                                                                                                Nov 28, 2024 13:55:45.371980906 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:55:45.536858082 CET497326847192.168.2.4135.148.195.248
                                                                                                                Nov 28, 2024 13:55:45.657159090 CET684749732135.148.195.248192.168.2.4
                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Nov 28, 2024 13:51:57.445281029 CET5355653192.168.2.41.1.1.1
                                                                                                                Nov 28, 2024 13:51:57.790685892 CET53535561.1.1.1192.168.2.4
                                                                                                                Nov 28, 2024 13:52:00.007059097 CET5124053192.168.2.41.1.1.1
                                                                                                                Nov 28, 2024 13:52:00.150881052 CET53512401.1.1.1192.168.2.4
                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                Nov 28, 2024 13:51:57.445281029 CET192.168.2.41.1.1.10xd5e4Standard query (0)yayabeloo.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                                Nov 28, 2024 13:52:00.007059097 CET192.168.2.41.1.1.10x9e21Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                Nov 28, 2024 13:51:57.790685892 CET1.1.1.1192.168.2.40xd5e4No error (0)yayabeloo.duckdns.org135.148.195.248A (IP address)IN (0x0001)false
                                                                                                                Nov 28, 2024 13:52:00.150881052 CET1.1.1.1192.168.2.40x9e21No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                                • geoplugin.net
                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                0192.168.2.449734178.237.33.50807588C:\Users\user\Desktop\SC_TR126089907.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                Nov 28, 2024 13:52:00.275346994 CET71OUTGET /json.gp HTTP/1.1
                                                                                                                Host: geoplugin.net
                                                                                                                Cache-Control: no-cache
                                                                                                                Nov 28, 2024 13:52:01.567095041 CET1171INHTTP/1.1 200 OK
                                                                                                                date: Thu, 28 Nov 2024 12:52:01 GMT
                                                                                                                server: Apache
                                                                                                                content-length: 963
                                                                                                                content-type: application/json; charset=utf-8
                                                                                                                cache-control: public, max-age=300
                                                                                                                access-control-allow-origin: *
                                                                                                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 32 32 38 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                                                Data Ascii: { "geoplugin_request":"8.46.123.228", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                                Click to jump to process

                                                                                                                Click to jump to process

                                                                                                                Click to dive into process behavior distribution

                                                                                                                Click to jump to process

                                                                                                                Target ID:0
                                                                                                                Start time:07:51:54
                                                                                                                Start date:28/11/2024
                                                                                                                Path:C:\Users\user\Desktop\SC_TR126089907.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Users\user\Desktop\SC_TR126089907.exe"
                                                                                                                Imagebase:0x790000
                                                                                                                File size:1'132'032 bytes
                                                                                                                MD5 hash:D8F15666D25A32702106B56DFD962CD6
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1686220574.0000000005660000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1683994512.0000000003B59000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1683994512.000000000469D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1683994512.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1683402498.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:2
                                                                                                                Start time:07:51:56
                                                                                                                Start date:28/11/2024
                                                                                                                Path:C:\Users\user\Desktop\SC_TR126089907.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:"C:\Users\user\Desktop\SC_TR126089907.exe"
                                                                                                                Imagebase:0xe0000
                                                                                                                File size:1'132'032 bytes
                                                                                                                MD5 hash:D8F15666D25A32702106B56DFD962CD6
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:3
                                                                                                                Start time:07:51:56
                                                                                                                Start date:28/11/2024
                                                                                                                Path:C:\Users\user\Desktop\SC_TR126089907.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Users\user\Desktop\SC_TR126089907.exe"
                                                                                                                Imagebase:0x5a0000
                                                                                                                File size:1'132'032 bytes
                                                                                                                MD5 hash:D8F15666D25A32702106B56DFD962CD6
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4145108532.00000000028DF000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4144683253.0000000000BF7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4144683253.0000000000C36000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                Reputation:low
                                                                                                                Has exited:false

                                                                                                                Reset < >

                                                                                                                  Execution Graph

                                                                                                                  Execution Coverage:9.5%
                                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                                  Signature Coverage:3%
                                                                                                                  Total number of Nodes:302
                                                                                                                  Total number of Limit Nodes:16
                                                                                                                  execution_graph 49582 5134372 49583 513438d 49582->49583 49584 51343e2 49583->49584 49585 513448c 49583->49585 49586 513443a CallWindowProcW 49584->49586 49588 51343e9 49584->49588 49589 51311fc 49585->49589 49586->49588 49590 5131207 49589->49590 49592 5132d49 49590->49592 49593 5131324 CallWindowProcW 49590->49593 49593->49592 49293 2a2d560 49294 2a2d5a6 49293->49294 49298 2a2d730 49294->49298 49302 2a2d740 49294->49302 49295 2a2d693 49299 2a2d740 49298->49299 49305 2a2d308 49299->49305 49303 2a2d308 DuplicateHandle 49302->49303 49304 2a2d76e 49303->49304 49304->49295 49306 2a2d7a8 DuplicateHandle 49305->49306 49307 2a2d76e 49306->49307 49307->49295 49392 57267e0 49395 572419c 49392->49395 49396 5726818 DrawTextExW 49395->49396 49398 57267fd 49396->49398 49594 6f2c510 49597 6f26664 49594->49597 49600 6f2666f 49597->49600 49598 6f2c529 49600->49598 49601 6f265b0 49600->49601 49602 6f2c088 PostMessageW 49601->49602 49603 6f2c0f4 49602->49603 49603->49598 49308 2a24668 49309 2a24684 49308->49309 49310 2a246a4 49309->49310 49314 2a24838 49309->49314 49319 2a243e8 49310->49319 49312 2a246c3 49315 2a2485d 49314->49315 49323 2a24937 49315->49323 49327 2a24948 49315->49327 49320 2a243f3 49319->49320 49335 2a25a80 49320->49335 49322 2a27234 49322->49312 49325 2a24948 49323->49325 49324 2a24a4c 49324->49324 49325->49324 49331 2a24544 49325->49331 49328 2a2496f 49327->49328 49329 2a24544 CreateActCtxA 49328->49329 49330 2a24a4c 49328->49330 49329->49330 49332 2a25dd8 CreateActCtxA 49331->49332 49334 2a25e9b 49332->49334 49336 2a25a8b 49335->49336 49339 2a25aa0 49336->49339 49338 2a273b5 49338->49322 49340 2a25aab 49339->49340 49343 2a25ad0 49340->49343 49342 2a2749a 49342->49338 49344 2a25adb 49343->49344 49347 2a25b00 49344->49347 49346 2a2758d 49346->49342 49348 2a25b0b 49347->49348 49350 2a28aeb 49348->49350 49354 2a2ad90 49348->49354 49349 2a28b29 49349->49346 49350->49349 49358 2a2ce80 49350->49358 49363 2a2ce90 49350->49363 49355 2a2ad95 49354->49355 49368 2a2b1d0 49355->49368 49359 2a2ce90 49358->49359 49360 2a2ced5 49359->49360 49376 2a2d438 49359->49376 49380 2a2d448 49359->49380 49360->49349 49365 2a2ceb1 49363->49365 49364 2a2ced5 49364->49349 49365->49364 49366 2a2d438 GetModuleHandleW 49365->49366 49367 2a2d448 GetModuleHandleW 49365->49367 49366->49364 49367->49364 49371 2a2b2b7 49368->49371 49369 2a2ada6 49369->49350 49372 2a2b2fc 49371->49372 49373 2a2b2d9 49371->49373 49372->49369 49373->49372 49374 2a2b500 GetModuleHandleW 49373->49374 49375 2a2b52d 49374->49375 49375->49369 49377 2a2d448 49376->49377 49378 2a2d48f 49377->49378 49384 2a2d240 49377->49384 49378->49360 49381 2a2d455 49380->49381 49382 2a2d240 GetModuleHandleW 49381->49382 49383 2a2d48f 49381->49383 49382->49383 49383->49360 49385 2a2d24b 49384->49385 49387 2a2dda0 49385->49387 49388 2a2d36c 49385->49388 49387->49387 49389 2a2d377 49388->49389 49390 2a25b00 GetModuleHandleW 49389->49390 49391 2a2de0f 49390->49391 49391->49387 49649 6f2be08 49650 6f2bf93 49649->49650 49652 6f2be2e 49649->49652 49651 6f265b0 PostMessageW 49651->49652 49652->49650 49652->49651 49653 5726c48 49654 5726c49 49653->49654 49655 5726d13 49654->49655 49656 5726cfe 49654->49656 49658 57241c4 3 API calls 49655->49658 49661 57241c4 49656->49661 49660 5726d22 49658->49660 49663 57241cf 49661->49663 49662 5726d09 49663->49662 49666 5727657 49663->49666 49672 5727668 49663->49672 49667 5727682 49666->49667 49678 572420c 49666->49678 49669 572768f 49667->49669 49670 57276b9 CreateIconFromResourceEx 49667->49670 49669->49662 49671 5727736 49670->49671 49671->49662 49673 572420c CreateIconFromResourceEx 49672->49673 49675 5727682 49673->49675 49674 572768f 49674->49662 49675->49674 49676 57276b9 CreateIconFromResourceEx 49675->49676 49677 5727736 49676->49677 49677->49662 49679 57276b8 CreateIconFromResourceEx 49678->49679 49681 5727736 49679->49681 49681->49667 49604 5137338 49605 5137365 49604->49605 49618 5136e9c 49605->49618 49609 513742b 49610 5136eac GetModuleHandleW 49609->49610 49611 513745d 49610->49611 49612 5136eac GetModuleHandleW 49611->49612 49613 513748f 49612->49613 49614 5136e9c GetModuleHandleW 49613->49614 49615 51374c1 49614->49615 49626 5136ecc 49615->49626 49617 5137525 49619 5136ea7 49618->49619 49621 51373f9 49619->49621 49631 5137054 49619->49631 49622 5136eac 49621->49622 49623 5136eb7 49622->49623 49624 5138fdb 49623->49624 49625 2a25b00 GetModuleHandleW 49623->49625 49624->49609 49625->49624 49627 5136ed7 49626->49627 49629 2a25ad0 GetModuleHandleW 49627->49629 49635 2a274da 49627->49635 49628 5139f6d 49628->49617 49629->49628 49632 513705f 49631->49632 49634 2a25b00 GetModuleHandleW 49632->49634 49633 5138d64 49633->49621 49634->49633 49636 2a274e3 49635->49636 49637 2a25b00 GetModuleHandleW 49636->49637 49638 2a2758d 49637->49638 49638->49628 49399 6f2a3ac 49400 6f2a3b3 49399->49400 49405 6f2aaf0 49400->49405 49422 6f2aac9 49400->49422 49440 6f2ab00 49400->49440 49401 6f2a121 49406 6f2ab00 49405->49406 49407 6f2ab22 49406->49407 49457 6f2b453 49406->49457 49462 6f2af6d 49406->49462 49467 6f2b1ed 49406->49467 49476 6f2b02e 49406->49476 49481 6f2b188 49406->49481 49486 6f2b16b 49406->49486 49491 6f2b164 49406->49491 49496 6f2b3a4 49406->49496 49501 6f2b2c6 49406->49501 49510 6f2b11c 49406->49510 49515 6f2b7be 49406->49515 49519 6f2b6da 49406->49519 49524 6f2b4d5 49406->49524 49529 6f2af11 49406->49529 49407->49401 49423 6f2ab32 49422->49423 49424 6f2aad2 49422->49424 49425 6f2ab22 49423->49425 49426 6f2b453 2 API calls 49423->49426 49427 6f2af11 2 API calls 49423->49427 49428 6f2b4d5 2 API calls 49423->49428 49429 6f2b6da 2 API calls 49423->49429 49430 6f2b7be 2 API calls 49423->49430 49431 6f2b11c 2 API calls 49423->49431 49432 6f2b2c6 4 API calls 49423->49432 49433 6f2b3a4 2 API calls 49423->49433 49434 6f2b164 2 API calls 49423->49434 49435 6f2b16b 2 API calls 49423->49435 49436 6f2b188 2 API calls 49423->49436 49437 6f2b02e 2 API calls 49423->49437 49438 6f2b1ed 4 API calls 49423->49438 49439 6f2af6d 2 API calls 49423->49439 49424->49401 49425->49401 49426->49425 49427->49425 49428->49425 49429->49425 49430->49425 49431->49425 49432->49425 49433->49425 49434->49425 49435->49425 49436->49425 49437->49425 49438->49425 49439->49425 49441 6f2ab1a 49440->49441 49442 6f2ab22 49441->49442 49443 6f2b453 2 API calls 49441->49443 49444 6f2af11 2 API calls 49441->49444 49445 6f2b4d5 2 API calls 49441->49445 49446 6f2b6da 2 API calls 49441->49446 49447 6f2b7be 2 API calls 49441->49447 49448 6f2b11c 2 API calls 49441->49448 49449 6f2b2c6 4 API calls 49441->49449 49450 6f2b3a4 2 API calls 49441->49450 49451 6f2b164 2 API calls 49441->49451 49452 6f2b16b 2 API calls 49441->49452 49453 6f2b188 2 API calls 49441->49453 49454 6f2b02e 2 API calls 49441->49454 49455 6f2b1ed 4 API calls 49441->49455 49456 6f2af6d 2 API calls 49441->49456 49442->49401 49443->49442 49444->49442 49445->49442 49446->49442 49447->49442 49448->49442 49449->49442 49450->49442 49451->49442 49452->49442 49453->49442 49454->49442 49455->49442 49456->49442 49458 6f2b3bb 49457->49458 49459 6f2b6fd 49458->49459 49534 6f29830 49458->49534 49538 6f29838 49458->49538 49463 6f2af73 49462->49463 49542 6f29d08 49463->49542 49546 6f29cfd 49463->49546 49468 6f2b1fc 49467->49468 49469 6f2b08a 49468->49469 49470 6f2b2ef 49468->49470 49550 6f298e0 49468->49550 49554 6f298e8 49468->49554 49469->49407 49471 6f2b608 49470->49471 49472 6f29830 ResumeThread 49470->49472 49473 6f29838 ResumeThread 49470->49473 49472->49470 49473->49470 49477 6f2b034 49476->49477 49478 6f2b062 49477->49478 49479 6f29d08 CreateProcessA 49477->49479 49480 6f29cfd CreateProcessA 49477->49480 49478->49407 49479->49478 49480->49478 49482 6f2b77a 49481->49482 49558 6f29b70 49482->49558 49562 6f29b69 49482->49562 49483 6f2b79f 49487 6f2b16f 49486->49487 49488 6f2b174 49486->49488 49487->49407 49488->49407 49488->49487 49566 6f29a80 49488->49566 49570 6f29a78 49488->49570 49492 6f2b533 49491->49492 49494 6f298e0 Wow64SetThreadContext 49492->49494 49495 6f298e8 Wow64SetThreadContext 49492->49495 49493 6f2b54e 49494->49493 49495->49493 49497 6f2b3aa 49496->49497 49498 6f2b6fd 49497->49498 49499 6f29830 ResumeThread 49497->49499 49500 6f29838 ResumeThread 49497->49500 49499->49497 49500->49497 49502 6f2b1fc 49501->49502 49502->49501 49504 6f2b2ef 49502->49504 49505 6f2b08a 49502->49505 49508 6f298e0 Wow64SetThreadContext 49502->49508 49509 6f298e8 Wow64SetThreadContext 49502->49509 49503 6f2b608 49504->49503 49506 6f29830 ResumeThread 49504->49506 49507 6f29838 ResumeThread 49504->49507 49505->49407 49506->49504 49507->49504 49508->49502 49509->49502 49511 6f2b175 49510->49511 49511->49407 49512 6f2b710 49511->49512 49513 6f29a80 WriteProcessMemory 49511->49513 49514 6f29a78 WriteProcessMemory 49511->49514 49512->49407 49513->49511 49514->49511 49574 6f299c0 49515->49574 49578 6f299b8 49515->49578 49516 6f2b7dc 49520 6f2b3bb 49519->49520 49520->49519 49521 6f2b6fd 49520->49521 49522 6f29830 ResumeThread 49520->49522 49523 6f29838 ResumeThread 49520->49523 49522->49520 49523->49520 49525 6f2b4de 49524->49525 49527 6f29a80 WriteProcessMemory 49525->49527 49528 6f29a78 WriteProcessMemory 49525->49528 49526 6f2b1aa 49526->49407 49527->49526 49528->49526 49530 6f2af71 49529->49530 49532 6f29d08 CreateProcessA 49530->49532 49533 6f29cfd CreateProcessA 49530->49533 49531 6f2b062 49531->49407 49532->49531 49533->49531 49535 6f29838 ResumeThread 49534->49535 49537 6f298a9 49535->49537 49537->49458 49539 6f29878 ResumeThread 49538->49539 49541 6f298a9 49539->49541 49541->49458 49543 6f29d91 49542->49543 49543->49543 49544 6f29ef6 CreateProcessA 49543->49544 49545 6f29f53 49544->49545 49545->49545 49547 6f29d91 49546->49547 49547->49547 49548 6f29ef6 CreateProcessA 49547->49548 49549 6f29f53 49548->49549 49549->49549 49551 6f298e8 Wow64SetThreadContext 49550->49551 49553 6f29975 49551->49553 49553->49468 49555 6f2992d Wow64SetThreadContext 49554->49555 49557 6f29975 49555->49557 49557->49468 49559 6f29bbb ReadProcessMemory 49558->49559 49561 6f29bff 49559->49561 49561->49483 49563 6f29b70 ReadProcessMemory 49562->49563 49565 6f29bff 49563->49565 49565->49483 49567 6f29ac8 WriteProcessMemory 49566->49567 49569 6f29b1f 49567->49569 49569->49488 49571 6f29ac8 WriteProcessMemory 49570->49571 49573 6f29b1f 49571->49573 49573->49488 49575 6f29a00 VirtualAllocEx 49574->49575 49577 6f29a3d 49575->49577 49577->49516 49579 6f29a00 VirtualAllocEx 49578->49579 49581 6f29a3d 49579->49581 49581->49516 49639 133d01c 49640 133d034 49639->49640 49641 133d08e 49640->49641 49643 51311fc CallWindowProcW 49640->49643 49644 5132ce9 49640->49644 49643->49641 49645 5132cf8 49644->49645 49647 5132d49 49645->49647 49648 5131324 CallWindowProcW 49645->49648 49648->49647

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 294 57241c4-5726d68 298 572724b-57272b4 294->298 299 5726d6e-5726d73 294->299 306 57272bb-5727343 298->306 299->298 300 5726d79-5726d96 299->300 300->306 307 5726d9c-5726da0 300->307 352 572734e-57273ce 306->352 308 5726da2-5726dac call 57241d4 307->308 309 5726daf-5726db3 307->309 308->309 313 5726dc2-5726dc9 309->313 314 5726db5-5726dbf call 57241d4 309->314 315 5726ee4-5726ee9 313->315 316 5726dcf-5726dff 313->316 314->313 319 5726ef1-5726ef6 315->319 320 5726eeb-5726eef 315->320 328 57275ce-57275e2 316->328 330 5726e05-5726ed8 call 57241e0 * 2 316->330 325 5726f08-5726f38 call 57241ec * 3 319->325 320->319 324 5726ef8-5726efc 320->324 327 5726f02-5726f05 324->327 324->328 325->352 353 5726f3e-5726f41 325->353 327->325 339 57275e4-57275e6 328->339 340 57275e9-57275f4 328->340 330->315 361 5726eda 330->361 339->340 343 57275f6-5727602 340->343 344 5727604 340->344 349 5727607-572760c 343->349 344->349 368 57273d5-5727457 352->368 353->352 356 5726f47-5726f49 353->356 356->352 358 5726f4f-5726f84 356->358 358->368 369 5726f8a-5726f93 358->369 361->315 374 572745f-57274e1 368->374 370 57270f6-57270fa 369->370 371 5726f99-5726ff3 call 57241ec * 2 call 57241fc * 2 369->371 373 5727100-5727104 370->373 370->374 417 5727005 371->417 418 5726ff5-5726ffe 371->418 377 572710a-5727110 373->377 378 57274e9-5727516 373->378 374->378 381 5727112 377->381 382 5727114-5727149 377->382 394 572751d-572759d 378->394 388 5727150-5727156 381->388 382->388 393 572715c-5727164 388->393 388->394 396 5727166-572716a 393->396 397 572716b-572716d 393->397 451 57275a4-57275c6 394->451 396->397 402 57271cf-57271d5 397->402 403 572716f-5727193 397->403 411 57271d7-57271f2 402->411 412 57271f4-5727222 402->412 436 5727195-572719a 403->436 437 572719c-57271a0 403->437 427 572722a-5727236 411->427 412->427 424 5727009-572700b 417->424 423 5727000-5727003 418->423 418->424 423->424 425 5727012-5727016 424->425 426 572700d 424->426 433 5727024-572702a 425->433 434 5727018-572701f 425->434 426->425 427->451 452 572723c-5727248 427->452 440 5727034-5727039 433->440 441 572702c-5727032 433->441 439 57270c1-57270c5 434->439 443 57271ac-57271bd 436->443 437->328 444 57271a6-57271a9 437->444 449 57270c7-57270e1 439->449 450 57270e4-57270f0 439->450 447 572703f-5727045 440->447 441->447 486 57271bf call 5727657 443->486 487 57271bf call 5727668 443->487 444->443 455 5727047-5727049 447->455 456 572704b-5727050 447->456 449->450 450->370 450->371 451->328 461 5727052-5727064 455->461 456->461 459 57271c5-57271cd 459->427 467 5727066-572706c 461->467 468 572706e-5727073 461->468 470 5727079-5727080 467->470 468->470 472 5727082-5727084 470->472 473 5727086 470->473 477 572708b-5727096 472->477 473->477 478 57270ba 477->478 479 5727098-572709b 477->479 478->439 479->439 481 572709d-57270a3 479->481 482 57270a5-57270a8 481->482 483 57270aa-57270b3 481->483 482->478 482->483 483->439 485 57270b5-57270b8 483->485 485->439 485->478 486->459 487->459
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: Hbq$Hbq$Hbq$Hbq$Hbq
                                                                                                                  • API String ID: 0-1677660839
                                                                                                                  • Opcode ID: 8551d3b870d34154ff4a0f5cbefc79624ce45b2098ae1dadb83021f457502672
                                                                                                                  • Instruction ID: 0418cf3329c13a49bdad4574b9ba59f9b92bcd8cd263291facc91d9b5b1274c1
                                                                                                                  • Opcode Fuzzy Hash: 8551d3b870d34154ff4a0f5cbefc79624ce45b2098ae1dadb83021f457502672
                                                                                                                  • Instruction Fuzzy Hash: 22328130A002688FDB58EFB9C9947AEBBF2FF88300F148569D449AB395DE349D45CB51
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 11d842d5a82abebaa0f27fffe71dd41ff9ca714f44486f638d9cc73a2d334a76
                                                                                                                  • Instruction ID: 210eff8a20988dd64b58b9af4bb6143ed2d50f8c281f472e14368bdb64ce2f94
                                                                                                                  • Opcode Fuzzy Hash: 11d842d5a82abebaa0f27fffe71dd41ff9ca714f44486f638d9cc73a2d334a76
                                                                                                                  • Instruction Fuzzy Hash: 4EC14B31A002689FCF19CFA5C984B9DBBF2FF89310F1481AAD449AB255EB30D985DF51
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: f3187489304066aca1667b18b64f63b1ad3a28ca8be9488ec681a1bc42a7747b
                                                                                                                  • Instruction ID: 7964514f48dc74153abdded4a255f9026def9995791b409e97155bc9666b56ff
                                                                                                                  • Opcode Fuzzy Hash: f3187489304066aca1667b18b64f63b1ad3a28ca8be9488ec681a1bc42a7747b
                                                                                                                  • Instruction Fuzzy Hash: 03A1D074D05228CFDB14CFAAD846BEEFBB6BF89300F10916AD409A7255DB345A85DF40
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: e2a65a4c5e2257e3724e2b163bb888c8f764275ba270932526634e9ec57f0cd8
                                                                                                                  • Instruction ID: 777e4fab892b93f94b0c4ea92dc5b7a0b3e13836717ca3574a6884220684808a
                                                                                                                  • Opcode Fuzzy Hash: e2a65a4c5e2257e3724e2b163bb888c8f764275ba270932526634e9ec57f0cd8
                                                                                                                  • Instruction Fuzzy Hash: F2A1F274D05228CFDB14CFA9D846BEEFBB6BF89300F1091AAD409AB251DB744A85DF40
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683339670.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_2a20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 1f67b8ad396301d0051d578837aca2cfcab55590a00ee6543b12d80d9ebb18d9
                                                                                                                  • Instruction ID: b137f0545192bd8470816d49ec59595ae711fea5f4d174fc016764d31083e596
                                                                                                                  • Opcode Fuzzy Hash: 1f67b8ad396301d0051d578837aca2cfcab55590a00ee6543b12d80d9ebb18d9
                                                                                                                  • Instruction Fuzzy Hash: EF81C274E002198FDB08DFE9D990AEEBBB2FF88310F248029D419AB365DB355946DF50
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683339670.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_2a20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 0a5ee058d4aaccb3b97880db89b94536f55f4a74652353e012b3aa9ab924fc79
                                                                                                                  • Instruction ID: b68948e08a344b5b63bd74156eb21415576c4fd62394a951f01ea7b913a73627
                                                                                                                  • Opcode Fuzzy Hash: 0a5ee058d4aaccb3b97880db89b94536f55f4a74652353e012b3aa9ab924fc79
                                                                                                                  • Instruction Fuzzy Hash: EF81C274E002198FDB08DFE9D990AEEBBB2FF88310F248029D419AB365DB355946DF50
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 123f00376a1990326563ac1feb9e168cac44c61e4916d3795ce6963d81a49e22
                                                                                                                  • Instruction ID: 7ab42f7a7df9e1aa33e5fb6d21cc1dbb9eac6f2621b34e4a17a4a8ad2b05393e
                                                                                                                  • Opcode Fuzzy Hash: 123f00376a1990326563ac1feb9e168cac44c61e4916d3795ce6963d81a49e22
                                                                                                                  • Instruction Fuzzy Hash: 58011A32D09229DFDBA18E90C8407F9BBB9BB4A308F1450D5D80E63152CB355A85DF50

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 532 6f29cfd-6f29d9d 534 6f29dd6-6f29df6 532->534 535 6f29d9f-6f29da9 532->535 540 6f29df8-6f29e02 534->540 541 6f29e2f-6f29e5e 534->541 535->534 536 6f29dab-6f29dad 535->536 538 6f29dd0-6f29dd3 536->538 539 6f29daf-6f29db9 536->539 538->534 542 6f29dbb 539->542 543 6f29dbd-6f29dcc 539->543 540->541 544 6f29e04-6f29e06 540->544 551 6f29e60-6f29e6a 541->551 552 6f29e97-6f29f51 CreateProcessA 541->552 542->543 543->543 545 6f29dce 543->545 546 6f29e08-6f29e12 544->546 547 6f29e29-6f29e2c 544->547 545->538 549 6f29e16-6f29e25 546->549 550 6f29e14 546->550 547->541 549->549 553 6f29e27 549->553 550->549 551->552 554 6f29e6c-6f29e6e 551->554 563 6f29f53-6f29f59 552->563 564 6f29f5a-6f29fe0 552->564 553->547 556 6f29e70-6f29e7a 554->556 557 6f29e91-6f29e94 554->557 558 6f29e7e-6f29e8d 556->558 559 6f29e7c 556->559 557->552 558->558 560 6f29e8f 558->560 559->558 560->557 563->564 574 6f29fe2-6f29fe6 564->574 575 6f29ff0-6f29ff4 564->575 574->575 576 6f29fe8 574->576 577 6f29ff6-6f29ffa 575->577 578 6f2a004-6f2a008 575->578 576->575 577->578 579 6f29ffc 577->579 580 6f2a00a-6f2a00e 578->580 581 6f2a018-6f2a01c 578->581 579->578 580->581 582 6f2a010 580->582 583 6f2a02e-6f2a035 581->583 584 6f2a01e-6f2a024 581->584 582->581 585 6f2a037-6f2a046 583->585 586 6f2a04c 583->586 584->583 585->586 588 6f2a04d 586->588 588->588
                                                                                                                  APIs
                                                                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F29F3E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 963392458-0
                                                                                                                  • Opcode ID: e4ed73d75124e03fb31966af87afc77344816c94373fb7aae1c2f95045f8f77c
                                                                                                                  • Instruction ID: ba2f4998365448b15b35b3fe8d85c2cd6454f5fc2ff412f25f78f80ba5313bff
                                                                                                                  • Opcode Fuzzy Hash: e4ed73d75124e03fb31966af87afc77344816c94373fb7aae1c2f95045f8f77c
                                                                                                                  • Instruction Fuzzy Hash: AF918E71D0062ACFDF60CFA9C8417DEBBB2BF48314F1485A9E849A7280DB749985CF91

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 589 6f29d08-6f29d9d 591 6f29dd6-6f29df6 589->591 592 6f29d9f-6f29da9 589->592 597 6f29df8-6f29e02 591->597 598 6f29e2f-6f29e5e 591->598 592->591 593 6f29dab-6f29dad 592->593 595 6f29dd0-6f29dd3 593->595 596 6f29daf-6f29db9 593->596 595->591 599 6f29dbb 596->599 600 6f29dbd-6f29dcc 596->600 597->598 601 6f29e04-6f29e06 597->601 608 6f29e60-6f29e6a 598->608 609 6f29e97-6f29f51 CreateProcessA 598->609 599->600 600->600 602 6f29dce 600->602 603 6f29e08-6f29e12 601->603 604 6f29e29-6f29e2c 601->604 602->595 606 6f29e16-6f29e25 603->606 607 6f29e14 603->607 604->598 606->606 610 6f29e27 606->610 607->606 608->609 611 6f29e6c-6f29e6e 608->611 620 6f29f53-6f29f59 609->620 621 6f29f5a-6f29fe0 609->621 610->604 613 6f29e70-6f29e7a 611->613 614 6f29e91-6f29e94 611->614 615 6f29e7e-6f29e8d 613->615 616 6f29e7c 613->616 614->609 615->615 617 6f29e8f 615->617 616->615 617->614 620->621 631 6f29fe2-6f29fe6 621->631 632 6f29ff0-6f29ff4 621->632 631->632 633 6f29fe8 631->633 634 6f29ff6-6f29ffa 632->634 635 6f2a004-6f2a008 632->635 633->632 634->635 636 6f29ffc 634->636 637 6f2a00a-6f2a00e 635->637 638 6f2a018-6f2a01c 635->638 636->635 637->638 639 6f2a010 637->639 640 6f2a02e-6f2a035 638->640 641 6f2a01e-6f2a024 638->641 639->638 642 6f2a037-6f2a046 640->642 643 6f2a04c 640->643 641->640 642->643 645 6f2a04d 643->645 645->645
                                                                                                                  APIs
                                                                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F29F3E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 963392458-0
                                                                                                                  • Opcode ID: 9fc78fcf07acc9f966e868c4ac54421cfdabea075cac092118a61e4ef388c2ff
                                                                                                                  • Instruction ID: fdd227da04f577c4570d1a2e838d9ee4286e1262bdb7c69ec6f7114637c4fa98
                                                                                                                  • Opcode Fuzzy Hash: 9fc78fcf07acc9f966e868c4ac54421cfdabea075cac092118a61e4ef388c2ff
                                                                                                                  • Instruction Fuzzy Hash: 7B917E71D0062ACFDF60CFA9C8407DEBBB2BF44314F1485A9E858A7250DB749985CF91

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 646 2a2b2b7-2a2b2d7 647 2a2b303-2a2b307 646->647 648 2a2b2d9-2a2b2e6 call 2a29d40 646->648 650 2a2b31b-2a2b35c 647->650 651 2a2b309-2a2b313 647->651 654 2a2b2e8 648->654 655 2a2b2fc 648->655 657 2a2b369-2a2b377 650->657 658 2a2b35e-2a2b366 650->658 651->650 702 2a2b2ee call 2a2b560 654->702 703 2a2b2ee call 2a2b550 654->703 655->647 659 2a2b39b-2a2b39d 657->659 660 2a2b379-2a2b37e 657->660 658->657 665 2a2b3a0-2a2b3a7 659->665 662 2a2b380-2a2b387 call 2a2af58 660->662 663 2a2b389 660->663 661 2a2b2f4-2a2b2f6 661->655 664 2a2b438-2a2b4f8 661->664 667 2a2b38b-2a2b399 662->667 663->667 697 2a2b500-2a2b52b GetModuleHandleW 664->697 698 2a2b4fa-2a2b4fd 664->698 668 2a2b3b4-2a2b3bb 665->668 669 2a2b3a9-2a2b3b1 665->669 667->665 670 2a2b3c8-2a2b3d1 call 2a2af68 668->670 671 2a2b3bd-2a2b3c5 668->671 669->668 677 2a2b3d3-2a2b3db 670->677 678 2a2b3de-2a2b3e3 670->678 671->670 677->678 679 2a2b401-2a2b405 678->679 680 2a2b3e5-2a2b3ec 678->680 704 2a2b408 call 2a2b832 679->704 705 2a2b408 call 2a2b860 679->705 680->679 682 2a2b3ee-2a2b3fe call 2a2af78 call 2a2af88 680->682 682->679 685 2a2b40b-2a2b40e 687 2a2b410-2a2b42e 685->687 688 2a2b431-2a2b437 685->688 687->688 699 2a2b534-2a2b548 697->699 700 2a2b52d-2a2b533 697->700 698->697 700->699 702->661 703->661 704->685 705->685
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02A2B51E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683339670.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_2a20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: HandleModule
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4139908857-0
                                                                                                                  • Opcode ID: d179ba64d7dde4363e05a53b37dab35953832f9471c17d7a67eeeb3206ec211e
                                                                                                                  • Instruction ID: fe976d30f3edd3f356e9651ac8e915d01945d5a69e3479e7b9abe6cca8b66605
                                                                                                                  • Opcode Fuzzy Hash: d179ba64d7dde4363e05a53b37dab35953832f9471c17d7a67eeeb3206ec211e
                                                                                                                  • Instruction Fuzzy Hash: 8B813570A00B558FD724DF29D58079ABBF1BF48308F008A6ED08AD7A50DB75E949CBA0

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 706 5131324-51343dc 709 51343e2-51343e7 706->709 710 513448c-51344ac call 51311fc 706->710 711 513443a-5134472 CallWindowProcW 709->711 712 51343e9-5134420 709->712 717 51344af-51344bc 710->717 714 5134474-513447a 711->714 715 513447b-513448a 711->715 720 5134422-5134428 712->720 721 5134429-5134438 712->721 714->715 715->717 720->721 721->717
                                                                                                                  APIs
                                                                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 05134461
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1685691546.0000000005130000.00000040.00000800.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5130000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CallProcWindow
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2714655100-0
                                                                                                                  • Opcode ID: 9567a4cdc35d461504f8a09770f1c608ff424bb1cc2c6eba1bbcd070bda276ad
                                                                                                                  • Instruction ID: af80e1ac802794b48477b92af3aa337ed66e1ab832dba611a62ed3e6b1f1596f
                                                                                                                  • Opcode Fuzzy Hash: 9567a4cdc35d461504f8a09770f1c608ff424bb1cc2c6eba1bbcd070bda276ad
                                                                                                                  • Instruction Fuzzy Hash: 54411AB4A00305DFDB14CF99C889AAABBF5FF88314F24C459D519AB321E775A841CFA0

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 723 2a24544-2a25e99 CreateActCtxA 726 2a25ea2-2a25efc 723->726 727 2a25e9b-2a25ea1 723->727 734 2a25f0b-2a25f0f 726->734 735 2a25efe-2a25f01 726->735 727->726 736 2a25f20 734->736 737 2a25f11-2a25f1d 734->737 735->734 738 2a25f21 736->738 737->736 738->738
                                                                                                                  APIs
                                                                                                                  • CreateActCtxA.KERNEL32(?), ref: 02A25E89
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683339670.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_2a20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Create
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2289755597-0
                                                                                                                  • Opcode ID: 2297726564d8455b4a8b6ce368fa5fe5231bc9ae2e36594bf7f33a558431aeb9
                                                                                                                  • Instruction ID: 65ecc106472c89ec15fa3ded11dade5f0074c82f0727e3643623670ef496a1e7
                                                                                                                  • Opcode Fuzzy Hash: 2297726564d8455b4a8b6ce368fa5fe5231bc9ae2e36594bf7f33a558431aeb9
                                                                                                                  • Instruction Fuzzy Hash: AB41D4B0C00619CFDB24DFA9C8847DEBBB5BF44304F64806AE418AB255DBB56949CF90

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 740 2a25dcc-2a25e99 CreateActCtxA 742 2a25ea2-2a25efc 740->742 743 2a25e9b-2a25ea1 740->743 750 2a25f0b-2a25f0f 742->750 751 2a25efe-2a25f01 742->751 743->742 752 2a25f20 750->752 753 2a25f11-2a25f1d 750->753 751->750 754 2a25f21 752->754 753->752 754->754
                                                                                                                  APIs
                                                                                                                  • CreateActCtxA.KERNEL32(?), ref: 02A25E89
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683339670.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_2a20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Create
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2289755597-0
                                                                                                                  • Opcode ID: 56f3b9811e6c5520de06eb678fc923215f50a6179928bfb22c44dcd52eb630f9
                                                                                                                  • Instruction ID: 5bdaba49519c25d878797732d00133ae0a28933829da582046328ecb9f1eb7c1
                                                                                                                  • Opcode Fuzzy Hash: 56f3b9811e6c5520de06eb678fc923215f50a6179928bfb22c44dcd52eb630f9
                                                                                                                  • Instruction Fuzzy Hash: F14104B0C00629CEDB24CFA9C9847CDBBF5BF49304F64845AD418AB255DB75694ACF90

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 756 5727668-572768d call 572420c 759 57276a2-57276b2 756->759 760 572768f-572769f 756->760 763 57276b4-57276b8 759->763 764 57276b9-5727734 CreateIconFromResourceEx 759->764 763->764 765 5727736-572773c 764->765 766 572773d-572775a 764->766 765->766
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateFromIconResource
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3668623891-0
                                                                                                                  • Opcode ID: 647e41827c84a6301981ab7432d7754c21cb158a152d9724b508b3ced60e7625
                                                                                                                  • Instruction ID: 1c8f8c4e8dcef9e3fb126b769bf429bdf114ff570734092677374741af922e61
                                                                                                                  • Opcode Fuzzy Hash: 647e41827c84a6301981ab7432d7754c21cb158a152d9724b508b3ced60e7625
                                                                                                                  • Instruction Fuzzy Hash: 443198719003599FCB11DFAAD904AEEBFF8EF49310F14809AF554A7221C335A850DFA1

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 770 572419c-5726864 773 5726866-572686c 770->773 774 572686f-572687e 770->774 773->774 775 5726883-57268bc DrawTextExW 774->775 776 5726880 774->776 777 57268c5-57268e2 775->777 778 57268be-57268c4 775->778 776->775 778->777
                                                                                                                  APIs
                                                                                                                  • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,057267FD,?,?), ref: 057268AF
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DrawText
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2175133113-0
                                                                                                                  • Opcode ID: a4d35a4f597059a73fbe0c14ed2ac499d4db528cc838d40c829bd681742f5721
                                                                                                                  • Instruction ID: 76171fefb58f9c2c3e3a3073947f28a6b053654ffb8ae4e0ef6fd52526a0d6e6
                                                                                                                  • Opcode Fuzzy Hash: a4d35a4f597059a73fbe0c14ed2ac499d4db528cc838d40c829bd681742f5721
                                                                                                                  • Instruction Fuzzy Hash: 5C31CEB5D002199FDB10CF9AD884AAEBBF5FB58320F14842AE919A7710D775A944CFA0

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 781 5726810-5726812 782 5726814 781->782 783 5726819-5726864 781->783 782->783 784 5726866-572686c 783->784 785 572686f-572687e 783->785 784->785 786 5726883-57268bc DrawTextExW 785->786 787 5726880 785->787 788 57268c5-57268e2 786->788 789 57268be-57268c4 786->789 787->786 789->788
                                                                                                                  APIs
                                                                                                                  • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,057267FD,?,?), ref: 057268AF
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DrawText
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2175133113-0
                                                                                                                  • Opcode ID: 5c4d608f614b0deeae19acfc4732c1f583919456a9c44bd9a974a0a6cd0e1171
                                                                                                                  • Instruction ID: c55218bf4f8c3a148c3e9943fd02658c8219e49583e655ddf493708cd8870138
                                                                                                                  • Opcode Fuzzy Hash: 5c4d608f614b0deeae19acfc4732c1f583919456a9c44bd9a974a0a6cd0e1171
                                                                                                                  • Instruction Fuzzy Hash: CC31C3B5D002199FDB10DF9AD884ADEFBF5FB48320F14842AE919A7610D775A944CFA0

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 792 6f29a78-6f29ace 794 6f29ad0-6f29adc 792->794 795 6f29ade-6f29b1d WriteProcessMemory 792->795 794->795 797 6f29b26-6f29b56 795->797 798 6f29b1f-6f29b25 795->798 798->797
                                                                                                                  APIs
                                                                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F29B10
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MemoryProcessWrite
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3559483778-0
                                                                                                                  • Opcode ID: 85d63469753e1eefd601310b4223fbbb866e0d97838d136d2fc431bef027a160
                                                                                                                  • Instruction ID: 36e025c407533b9664209f107757eee4b98b5b927c1adb8e60733bf908ba5f4e
                                                                                                                  • Opcode Fuzzy Hash: 85d63469753e1eefd601310b4223fbbb866e0d97838d136d2fc431bef027a160
                                                                                                                  • Instruction Fuzzy Hash: 132124B5D002198FCB10CFA9C885BDEBBF1FB48310F10842AE559A7250C7789945CF64
                                                                                                                  APIs
                                                                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F29B10
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MemoryProcessWrite
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3559483778-0
                                                                                                                  • Opcode ID: 71cd5aa5720b9a32cd50e28207260e69f9e9b587ef9451693796b8adabe5aa14
                                                                                                                  • Instruction ID: 1f7f72ad794f3482c9b47dfddedb22f6c79223b91c7351b6ecada8bfe790312b
                                                                                                                  • Opcode Fuzzy Hash: 71cd5aa5720b9a32cd50e28207260e69f9e9b587ef9451693796b8adabe5aa14
                                                                                                                  • Instruction Fuzzy Hash: 4F2113B1D003599FCB10DFAAC885BDEBBF5FB48310F10842AE959A7250D778A944CFA4
                                                                                                                  APIs
                                                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F29BF0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MemoryProcessRead
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1726664587-0
                                                                                                                  • Opcode ID: cc94317b315578583be8b8034e56f2333f9d0a473750f5e331db17ccab3bf0b9
                                                                                                                  • Instruction ID: 6591a52fafb34b457a4e71275d345370d46eab13f7005ccbb141d583ce142929
                                                                                                                  • Opcode Fuzzy Hash: cc94317b315578583be8b8034e56f2333f9d0a473750f5e331db17ccab3bf0b9
                                                                                                                  • Instruction Fuzzy Hash: BD2116B1C003599FCB10DFAAC885AEEBBF5FF48320F50842AE559A7250C7789945CBA4
                                                                                                                  APIs
                                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F29966
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ContextThreadWow64
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 983334009-0
                                                                                                                  • Opcode ID: 7ca4c06354294c19d5eeedf10c4fb96ca1c207114f3ab87b931245d38ed36159
                                                                                                                  • Instruction ID: 599cee49b2614e618e162fe6be111241e1bf21c0bb763b0293d105e1b85842af
                                                                                                                  • Opcode Fuzzy Hash: 7ca4c06354294c19d5eeedf10c4fb96ca1c207114f3ab87b931245d38ed36159
                                                                                                                  • Instruction Fuzzy Hash: C82187B1D002098FDB10DFAAC4857EEBBF4EB88320F10842AD459A7240CB78A945CFA4
                                                                                                                  APIs
                                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02A2D76E,?,?,?,?,?), ref: 02A2D82F
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683339670.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_2a20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DuplicateHandle
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3793708945-0
                                                                                                                  • Opcode ID: bc0a884594f5b8219cf68d84683a620c79e7b3348e6c11a9d0b531c78794b5b4
                                                                                                                  • Instruction ID: 4af75e79c04dc048c7a1acfba485877618a09f33e613826a96958e533e616ab6
                                                                                                                  • Opcode Fuzzy Hash: bc0a884594f5b8219cf68d84683a620c79e7b3348e6c11a9d0b531c78794b5b4
                                                                                                                  • Instruction Fuzzy Hash: DF2105B5900258DFDB10CF99D584ADEBBF4FB48310F10841AE918A7311D374A944CFA0
                                                                                                                  APIs
                                                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F29BF0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MemoryProcessRead
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1726664587-0
                                                                                                                  • Opcode ID: 346c7971fd88bd0ab96ae0d480a4414442b51800ebbd46fb9111d7b1fc68eda6
                                                                                                                  • Instruction ID: b9707d1707b334c73f03622dc1367f777153c0d61d874bee3689a88349195203
                                                                                                                  • Opcode Fuzzy Hash: 346c7971fd88bd0ab96ae0d480a4414442b51800ebbd46fb9111d7b1fc68eda6
                                                                                                                  • Instruction Fuzzy Hash: 8F2128B1C002599FCB10DFAAC884ADEFBF5FF48310F108429E559A7250C7789544CFA4
                                                                                                                  APIs
                                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F29966
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ContextThreadWow64
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 983334009-0
                                                                                                                  • Opcode ID: f598268f797d68aea24f33df534741f2565c1d54027aa232691fd46bbdbfaf8c
                                                                                                                  • Instruction ID: 5f25a3bdf29f65d4395a4b09f45ed749f69c93767274c469034a32555d98b5e3
                                                                                                                  • Opcode Fuzzy Hash: f598268f797d68aea24f33df534741f2565c1d54027aa232691fd46bbdbfaf8c
                                                                                                                  • Instruction Fuzzy Hash: 412138B1D002198FDB10DFAAC4857EEBBF4EF48324F108429D559A7240DB78A944CFA5
                                                                                                                  APIs
                                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02A2D76E,?,?,?,?,?), ref: 02A2D82F
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683339670.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_2a20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DuplicateHandle
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3793708945-0
                                                                                                                  • Opcode ID: 04417f6bdd0f5937c9f09af7e6feea9c0d184f90fd7e54a067051361132d4872
                                                                                                                  • Instruction ID: f9f78f1813206fc272af815ee57e89f2151f55add73482d4d96c45c048aae326
                                                                                                                  • Opcode Fuzzy Hash: 04417f6bdd0f5937c9f09af7e6feea9c0d184f90fd7e54a067051361132d4872
                                                                                                                  • Instruction Fuzzy Hash: BA21E0B5D002589FDB10CFA9D984ADEBFF5FB48320F14845AE958A3250D378A944CFA0
                                                                                                                  APIs
                                                                                                                  • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,05727682,?,?,?,?,?), ref: 05727727
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateFromIconResource
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3668623891-0
                                                                                                                  • Opcode ID: f199795ac51f18bef8451cde92f71be2437835dd8a13d0c7fb5676184cf3be7c
                                                                                                                  • Instruction ID: 6d1da87e1e95bb25d924694e9348e8768b143a1c8c62f817178e638c435b1df8
                                                                                                                  • Opcode Fuzzy Hash: f199795ac51f18bef8451cde92f71be2437835dd8a13d0c7fb5676184cf3be7c
                                                                                                                  • Instruction Fuzzy Hash: 161167B5800259DFCB10CF9AC944BDEBFF8FB48320F14841AE959A7210C375A950DFA4
                                                                                                                  APIs
                                                                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F29A2E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AllocVirtual
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4275171209-0
                                                                                                                  • Opcode ID: 3e0530bb8fdc655f0c27782bc7dc48b4559d24fef7875811f9d65cb2bf0b017c
                                                                                                                  • Instruction ID: 60f00538ecca81545b13af77a0095717cd4e926d2f8b10f59cd00ba41704461f
                                                                                                                  • Opcode Fuzzy Hash: 3e0530bb8fdc655f0c27782bc7dc48b4559d24fef7875811f9d65cb2bf0b017c
                                                                                                                  • Instruction Fuzzy Hash: 11112671D002598FCB10DFAAC844BEEBFF5FB88324F24841AE559A7260C7759945CFA4
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ResumeThread
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 947044025-0
                                                                                                                  • Opcode ID: bad0ec1747bcce3165e72c2916c01e129032ff66ecdf0a4fddfa457d5b00ba21
                                                                                                                  • Instruction ID: 4c821ec9d23cfb478cdbee479b0bd166e3610b4b503cb265eee00341c407409f
                                                                                                                  • Opcode Fuzzy Hash: bad0ec1747bcce3165e72c2916c01e129032ff66ecdf0a4fddfa457d5b00ba21
                                                                                                                  • Instruction Fuzzy Hash: 89119AB1C002498FCB10DFAAC8457DEFBF4EB88324F248429D459A7200CB79A840CFA4
                                                                                                                  APIs
                                                                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F29A2E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AllocVirtual
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4275171209-0
                                                                                                                  • Opcode ID: d98f4fdd13c9f412b8cd116b7955e73eef5d82b7185a8d260baafc00c5a41582
                                                                                                                  • Instruction ID: 7e614b5db7dc7aeffec6bc4a21551a28a12596e643a7e2c941dfb186620df134
                                                                                                                  • Opcode Fuzzy Hash: d98f4fdd13c9f412b8cd116b7955e73eef5d82b7185a8d260baafc00c5a41582
                                                                                                                  • Instruction Fuzzy Hash: 37112671D002599FCB10DFAAC845ADEBFF5EB88324F108419E559A7250C775A544CFA4
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ResumeThread
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 947044025-0
                                                                                                                  • Opcode ID: 73e940039341717fc887b1bd5bfa4223cb51992b7742cf424f577e26f8759881
                                                                                                                  • Instruction ID: b1a09d85df30a6dbc9580c9098b93723027b85e3ecb440bd9cdff322f071589f
                                                                                                                  • Opcode Fuzzy Hash: 73e940039341717fc887b1bd5bfa4223cb51992b7742cf424f577e26f8759881
                                                                                                                  • Instruction Fuzzy Hash: 3F1166B1D002598FDB20DFAAC8447DEFBF4EB88324F248429C559A7240CB79A944CFA4
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02A2B51E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683339670.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_2a20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: HandleModule
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4139908857-0
                                                                                                                  • Opcode ID: 982488d53f32bc4baf4fd0931749e5beb49bb1e0df27e8c4288281774751857c
                                                                                                                  • Instruction ID: a244b3e3d51bc72038dec5aeb00db98c91a4992f5839ce989473f51878e7d80b
                                                                                                                  • Opcode Fuzzy Hash: 982488d53f32bc4baf4fd0931749e5beb49bb1e0df27e8c4288281774751857c
                                                                                                                  • Instruction Fuzzy Hash: 621110B5C002598FCB10CF9AD444BDEFBF8AF88328F14886AD469A7210D779A545CFA1
                                                                                                                  APIs
                                                                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F2C0E5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessagePost
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 410705778-0
                                                                                                                  • Opcode ID: d9066aef30446d29c4622204e74d6946efe840d9e0524bc12ac2d8b806a434fd
                                                                                                                  • Instruction ID: 13e3a39b29f7be33113c8b58f309d731d78b1c03bdda7b23a4e79a2802c088f7
                                                                                                                  • Opcode Fuzzy Hash: d9066aef30446d29c4622204e74d6946efe840d9e0524bc12ac2d8b806a434fd
                                                                                                                  • Instruction Fuzzy Hash: 0D1103B5800359DFDB60DF9AC888BDEBBF8FB48320F108459E559A7200C775A984CFA5
                                                                                                                  APIs
                                                                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F2C0E5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessagePost
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 410705778-0
                                                                                                                  • Opcode ID: 8a506778007010993d16087638b72e8ea1f31ec440200b127ab854869d11072f
                                                                                                                  • Instruction ID: 59bb7739fb01c2d14de7802e600f0532f2a7cdde8b2a897b214e82c80eb7e5f9
                                                                                                                  • Opcode Fuzzy Hash: 8a506778007010993d16087638b72e8ea1f31ec440200b127ab854869d11072f
                                                                                                                  • Instruction Fuzzy Hash: 891106B58003599FCB50DF99C845BDEBBF8FB48324F108419D559A7600C379A944CFA5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1682993009.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_132d000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 135e4c641e82224911c91560ca78cd6d1014d25d8a6def8d2c2384aa22b706f4
                                                                                                                  • Instruction ID: 2235368d3b795fd8c51347aa4ec8feded7810130610f7d39db5f43e9aaf3a2ff
                                                                                                                  • Opcode Fuzzy Hash: 135e4c641e82224911c91560ca78cd6d1014d25d8a6def8d2c2384aa22b706f4
                                                                                                                  • Instruction Fuzzy Hash: 8F212271504244DFDB05EF58D9C0B2ABFA5FB8831CF30C669E9094B256C376D456CAA2
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683035795.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_133d000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 46c54c9955a625653cabf24cf83d220199208f0455ff328071b19937fe3b0ce7
                                                                                                                  • Instruction ID: 96a3e36c00acaf914168ae2d4f670b302668814325bfbf2629d4c1e141b3baae
                                                                                                                  • Opcode Fuzzy Hash: 46c54c9955a625653cabf24cf83d220199208f0455ff328071b19937fe3b0ce7
                                                                                                                  • Instruction Fuzzy Hash: 62214671504204EFDB01DF98D9C0B26BBA5FBC4328F60C66DE8098B352C33AD446CA65
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683035795.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_133d000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: f0138f3b46d11c4a3377743f1c87bf6b4599671b1109656db98025e0da4b4cb1
                                                                                                                  • Instruction ID: 8e79623eba891b7e394f7cf88e156b51aa5882292475c47046b0a43dba2b7369
                                                                                                                  • Opcode Fuzzy Hash: f0138f3b46d11c4a3377743f1c87bf6b4599671b1109656db98025e0da4b4cb1
                                                                                                                  • Instruction Fuzzy Hash: A3213070604204DFCB11DF68D980B26FBA5FB84B18F60C569E80A4B256C33AC446CA61
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683035795.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_133d000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: beab6543dc73b4be326283cd59cb534281c5d8f532dceed4d6695b83762cc6a3
                                                                                                                  • Instruction ID: 4919f45769813ed1bcba44b682825ea4165a7a91937a41b9f43e935a09243363
                                                                                                                  • Opcode Fuzzy Hash: beab6543dc73b4be326283cd59cb534281c5d8f532dceed4d6695b83762cc6a3
                                                                                                                  • Instruction Fuzzy Hash: FD2153755083809FDB02CF64D994711BF71EB86618F24C5DAD8498F2A7C33A9856CB62
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1682993009.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_132d000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                  • Instruction ID: c7e7c0e9d3b14ce08680d05fbfd0b5c0d4bc28f129ae4b349fbddffba5870153
                                                                                                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                  • Instruction Fuzzy Hash: 1911E172404280CFDB02DF54D5C4B16BF71FB84318F34C6A9D8090B256C336D45ACBA1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683035795.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_133d000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                                  • Instruction ID: 759507945bc8f8997bd666a632b1bf77b5d2ad21792a0372d736e69618f1b5af
                                                                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                                  • Instruction Fuzzy Hash: A311BB75504280DFDB02CF54C5C4B15BFB1FB84228F24C6AAD8498B296C33AD40ACB61
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1682993009.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_132d000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: b68d52588ad5e1888e33987b4ebfc48788b802cb7ce3f71f8b9360f9e8cc05e4
                                                                                                                  • Instruction ID: 329662fdb1cb5adc2e5b7b76bd4b1ae822b00cc96af5b21541475b19ee302ca2
                                                                                                                  • Opcode Fuzzy Hash: b68d52588ad5e1888e33987b4ebfc48788b802cb7ce3f71f8b9360f9e8cc05e4
                                                                                                                  • Instruction Fuzzy Hash: BC01A2710093949AE711AEADCD847A7BF9CEF41328F18C92AED094A296D67D9840C6B1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1682993009.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_132d000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 5bf6e0525d2733d42c6f22b51248c56d7b695e72fbabdfdfd10f864479c032ae
                                                                                                                  • Instruction ID: eb753679f7ae116fc7ef08d1db8f225b70cd7af2eded0f834d8de42f09887928
                                                                                                                  • Opcode Fuzzy Hash: 5bf6e0525d2733d42c6f22b51248c56d7b695e72fbabdfdfd10f864479c032ae
                                                                                                                  • Instruction Fuzzy Hash: 19F0C2710043949AE7109E1ACC84BA2FFA8EB80338F18C45AED084F286C2799840CA70
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q$TJcq$Te^q$pbq$xbaq
                                                                                                                  • API String ID: 0-2576840827
                                                                                                                  • Opcode ID: e947d7bd70acf9c719c4afd6b17a5e2ef611c017c02eb80eef0d399afc024d85
                                                                                                                  • Instruction ID: 61768362deb97de914dc41b4b26a92817728cb0343027436663cdfc1631cdc4f
                                                                                                                  • Opcode Fuzzy Hash: e947d7bd70acf9c719c4afd6b17a5e2ef611c017c02eb80eef0d399afc024d85
                                                                                                                  • Instruction Fuzzy Hash: E6B2C475E00228DFDB64CF69C984AD9BBB2FF89304F1581E9D509AB225DB319E81CF40
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: TJcq$Te^q$xbaq
                                                                                                                  • API String ID: 0-3225726259
                                                                                                                  • Opcode ID: 5d51591512a2b7f14df90470b6bae3c4e130e0a0f1eeb1fd7eb4e467bb1ff884
                                                                                                                  • Instruction ID: 4fb5156039c9ca5ee5ddcfbf2c207a699f636652c1363f02e6128228f904d8ad
                                                                                                                  • Opcode Fuzzy Hash: 5d51591512a2b7f14df90470b6bae3c4e130e0a0f1eeb1fd7eb4e467bb1ff884
                                                                                                                  • Instruction Fuzzy Hash: E9C18375E00668CFDB58DF6AC944ADDBBF2BF89301F14C1A9D809AB325DB305A858F50
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: SOw
                                                                                                                  • API String ID: 0-1671456412
                                                                                                                  • Opcode ID: 097442bc4e44914205606613c32477f79300e6735df319ea8b189a9c66c7e13e
                                                                                                                  • Instruction ID: f4f7df1965f461d1e998095c4d5e5f0932f95e47cdc11e0237261b15a507d7a7
                                                                                                                  • Opcode Fuzzy Hash: 097442bc4e44914205606613c32477f79300e6735df319ea8b189a9c66c7e13e
                                                                                                                  • Instruction Fuzzy Hash: 88E1FC74E0025A8FDB54DF99C5809AEFBF2FF49304F248159E414AB356DB31A981CFA1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: Hbq
                                                                                                                  • API String ID: 0-1245868
                                                                                                                  • Opcode ID: a45d7994f4733092a9ac027354931f074b06957bd9a3f63d144f4586c8877336
                                                                                                                  • Instruction ID: 5bfba81019c775124568901228f5e49ba06d7c6ddccf46f2ad0c851733a9a811
                                                                                                                  • Opcode Fuzzy Hash: a45d7994f4733092a9ac027354931f074b06957bd9a3f63d144f4586c8877336
                                                                                                                  • Instruction Fuzzy Hash: 13A15070A00209DFDB44EFB8C5946AE7BF6FF88304F108529D409AB394DE39AD42CB65
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q
                                                                                                                  • API String ID: 0-1614139903
                                                                                                                  • Opcode ID: 8b6fddcd7684a5c684ff98fda4fd829e241c0a9f9dd881170361510cebbe5cec
                                                                                                                  • Instruction ID: 7f4e32de69b11d3b7f29b0a60db02ef010dd50dd449b0041a5db9e3bf6da3dc9
                                                                                                                  • Opcode Fuzzy Hash: 8b6fddcd7684a5c684ff98fda4fd829e241c0a9f9dd881170361510cebbe5cec
                                                                                                                  • Instruction Fuzzy Hash: BC61FBB1A102098FD748EF7AEA4269ABFF6FB88304F14D529D0059B368DF755846CB40
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686319609.0000000005720000.00000040.00000800.00020000.00000000.sdmp, Offset: 05720000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5720000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 4'^q
                                                                                                                  • API String ID: 0-1614139903
                                                                                                                  • Opcode ID: a66ba10b5e7f4674ee9dbb864757da5e8f7411297f2ff16ea89722a2495db7be
                                                                                                                  • Instruction ID: ee8e8a9b714237bf01ac95bc5b1f54a4942a76ef3731b28763bc03858b859047
                                                                                                                  • Opcode Fuzzy Hash: a66ba10b5e7f4674ee9dbb864757da5e8f7411297f2ff16ea89722a2495db7be
                                                                                                                  • Instruction Fuzzy Hash: 9961D9B1A102098FD748EF7AEA8269ABFF7FB88304F14D529D0059B368DF755846CB50
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: SOw
                                                                                                                  • API String ID: 0-1671456412
                                                                                                                  • Opcode ID: 477acb204a3edc9e40f5720b504c1895bbd0be4ef6a6a35dafb13659b38ced16
                                                                                                                  • Instruction ID: 23554e9aa564b8ec346c9ed8fc72710c05a76d4ddad107b0309b81bcc553dbfa
                                                                                                                  • Opcode Fuzzy Hash: 477acb204a3edc9e40f5720b504c1895bbd0be4ef6a6a35dafb13659b38ced16
                                                                                                                  • Instruction Fuzzy Hash: AB51E874E0021A8BDB14DFA9C5815AEFBF2FF89304F24C169D418AB355DB319982CFA1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 934278a45036323fda4709ccc15c9dc9339d5368c95016d6ade11cecc9d099f5
                                                                                                                  • Instruction ID: cae7e344c32e68361a733a0a0dcba6c96e7c700a55991f10389fe4a8246c837f
                                                                                                                  • Opcode Fuzzy Hash: 934278a45036323fda4709ccc15c9dc9339d5368c95016d6ade11cecc9d099f5
                                                                                                                  • Instruction Fuzzy Hash: 72D1BA31B002258FDB99DB79C990BAEBBF7AF89300F248469D1558B291CF38D906CF51
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1685691546.0000000005130000.00000040.00000800.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5130000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 7b505cd5fd6639955e274fbb5b3aa96c3cad943ec8fbfed30e9338c434c50a9a
                                                                                                                  • Instruction ID: e6aefc7aedc4fc60905f7dec16087604e0dce541ca28cd17abc6afeb770e55aa
                                                                                                                  • Opcode Fuzzy Hash: 7b505cd5fd6639955e274fbb5b3aa96c3cad943ec8fbfed30e9338c434c50a9a
                                                                                                                  • Instruction Fuzzy Hash: 3712A4B4421B45AED320CF65EC4E9AD7FB2B745328B504209EAE12A2E1DFBC154BCF45
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: ed1b8295e28825d4b33786c68b03f2af44b4cbd3aa2c45256ef1a187fdff48da
                                                                                                                  • Instruction ID: 7dfe812b2ecd6633711fa15a61d0ad3e6447c53a35cd8a2ddc02f186b5ea0cc6
                                                                                                                  • Opcode Fuzzy Hash: ed1b8295e28825d4b33786c68b03f2af44b4cbd3aa2c45256ef1a187fdff48da
                                                                                                                  • Instruction Fuzzy Hash: DFE1FC74E0026A8FDB14DFA9C5809AEFBF2FF49304F248159D415AB356DB30A981CFA1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: ace27e69c9c61cf62f7ba2d133e3445f0d1349e9e4d280d59f1a8265c8497555
                                                                                                                  • Instruction ID: acb346c6b04f04d5de3f7c981244b666d2c63c914dc2e536c5215c75ee1db8a3
                                                                                                                  • Opcode Fuzzy Hash: ace27e69c9c61cf62f7ba2d133e3445f0d1349e9e4d280d59f1a8265c8497555
                                                                                                                  • Instruction Fuzzy Hash: 63E10C74E0025A8FCB14DFAAC5809AEFBF2FF89304F248159D414A7356DB71A981CFA1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: ab2dc8d1065c5b681050bc1325bc72b87d9c7ccc206267c014ccb01f364e70d9
                                                                                                                  • Instruction ID: 7d45f015ce3c9ea9de370b4711e516169cf117ddd46d539332fe467d258ab0b8
                                                                                                                  • Opcode Fuzzy Hash: ab2dc8d1065c5b681050bc1325bc72b87d9c7ccc206267c014ccb01f364e70d9
                                                                                                                  • Instruction Fuzzy Hash: FAE11E74E0025A8FDB54DF99C5809AEFBF2FF49344F248159E414AB356DB30A985CFA0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 9a58e26a7b2bc794f8c88fb64b6d6574bc4a81f2ac0cbcd0b727e248fdc3adc7
                                                                                                                  • Instruction ID: 8445446dfd77b3c7aa968a8dd0c9564413692e31160ab0078ac57ecd26d29e36
                                                                                                                  • Opcode Fuzzy Hash: 9a58e26a7b2bc794f8c88fb64b6d6574bc4a81f2ac0cbcd0b727e248fdc3adc7
                                                                                                                  • Instruction Fuzzy Hash: 6CE1FD74E0025A8FDB54DFA9C5809AEFBF2FF89304F248159D414AB359DB31A981CFA1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1685691546.0000000005130000.00000040.00000800.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5130000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 931cb30275ae8c42dc4471dea65bab7e8fd8c04439b0ca9af39fe3cf65a67eef
                                                                                                                  • Instruction ID: 5419a7ba8e65d4d676bebdbdfd9f8ef012280d399697d89b8c6e3b3760af6188
                                                                                                                  • Opcode Fuzzy Hash: 931cb30275ae8c42dc4471dea65bab7e8fd8c04439b0ca9af39fe3cf65a67eef
                                                                                                                  • Instruction Fuzzy Hash: C8D1E435D2075A8ECB00EB64D990B99F771FF99300F50C79AD00A3B624EB706AC9CB91
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1683339670.0000000002A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_2a20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 2797b108b42f048890f6e8eaf470cc513202dc8bc5c8b9a5771cd9a11f593127
                                                                                                                  • Instruction ID: 3f0a7a937667bbf408872fe5e9fbdb5be602c5a902c05a18c231f64f78f48cdc
                                                                                                                  • Opcode Fuzzy Hash: 2797b108b42f048890f6e8eaf470cc513202dc8bc5c8b9a5771cd9a11f593127
                                                                                                                  • Instruction Fuzzy Hash: 34A14F31A002258FCF09DFB8C98459EBBB2FF85304B15456AE805AB255DF75E95ACF40
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1685691546.0000000005130000.00000040.00000800.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5130000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: b953522ca37d3eeac1319db287f1f1555bc30a73a1e3436b19ea50f0619a270a
                                                                                                                  • Instruction ID: 2940b9c0316008b9b4e4161d01aa1d910ec4521509d9d563158aee5a474c186a
                                                                                                                  • Opcode Fuzzy Hash: b953522ca37d3eeac1319db287f1f1555bc30a73a1e3436b19ea50f0619a270a
                                                                                                                  • Instruction Fuzzy Hash: 23D1D535D2075A8ACB10EB64D990B9DF771FF99300F50C79AD00A3B624EB716AC9CB91
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1685691546.0000000005130000.00000040.00000800.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_5130000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 11245305a9a5c6e945d654f98ae5bdd011324bb335df44e9d4aa7721667f1edb
                                                                                                                  • Instruction ID: 251255087475ffbd014afd115b5eb77f49550a513f05e51fa1b4fb5259f9dcc6
                                                                                                                  • Opcode Fuzzy Hash: 11245305a9a5c6e945d654f98ae5bdd011324bb335df44e9d4aa7721667f1edb
                                                                                                                  • Instruction Fuzzy Hash: C0C109B0421B46AED720CF65EC4A9AD7FB2BB85328F504219E5A16B2D1DFBC1487CF44
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000000.00000002.1686577407.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_0_2_6f20000_SC_TR126089907.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: d4c6af620641c48af4721f8b0ba76d43a4b264884090d6c1558a1dec9ba6436d
                                                                                                                  • Instruction ID: 23c6d1c20a5057e806f41d7fed0f6b7fcc520c8fc495911027d526dcb92f03d4
                                                                                                                  • Opcode Fuzzy Hash: d4c6af620641c48af4721f8b0ba76d43a4b264884090d6c1558a1dec9ba6436d
                                                                                                                  • Instruction Fuzzy Hash: 7B51FA74E0021A8BDB14DFA9C5816AEFBF2FF89314F24C169D418A7355DB319A42CFA1

                                                                                                                  Execution Graph

                                                                                                                  Execution Coverage:4.2%
                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                  Signature Coverage:6%
                                                                                                                  Total number of Nodes:1328
                                                                                                                  Total number of Limit Nodes:57
                                                                                                                  execution_graph 45608 446ac5 45609 446ad0 RtlFreeHeap 45608->45609 45610 446af9 __dosmaperr 45608->45610 45609->45610 45611 446ae5 45609->45611 45614 445354 20 API calls __dosmaperr 45611->45614 45613 446aeb GetLastError 45613->45610 45614->45613 45615 41d4d0 45617 41d4e6 _Yarn ___scrt_fastfail 45615->45617 45616 41d6e3 45621 41d734 45616->45621 45631 41d071 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 45616->45631 45617->45616 45619 431f99 21 API calls 45617->45619 45623 41d696 ___scrt_fastfail 45619->45623 45620 41d6f4 45620->45621 45622 41d760 45620->45622 45632 431f99 45620->45632 45622->45621 45640 41d474 21 API calls ___scrt_fastfail 45622->45640 45623->45621 45625 431f99 21 API calls 45623->45625 45629 41d6be ___scrt_fastfail 45625->45629 45627 41d72d ___scrt_fastfail 45627->45621 45637 43264f 45627->45637 45629->45621 45630 431f99 21 API calls 45629->45630 45630->45616 45631->45620 45633 431fa3 45632->45633 45634 431fa7 45632->45634 45633->45627 45641 43a88c 45634->45641 45650 43256f 45637->45650 45639 432657 45639->45622 45640->45621 45646 446aff _strftime 45641->45646 45642 446b3d 45649 445354 20 API calls __dosmaperr 45642->45649 45643 446b28 RtlAllocateHeap 45645 431fac 45643->45645 45643->45646 45645->45627 45646->45642 45646->45643 45648 442200 7 API calls 2 library calls 45646->45648 45648->45646 45649->45645 45651 432588 45650->45651 45655 43257e 45650->45655 45652 431f99 21 API calls 45651->45652 45651->45655 45653 4325a9 45652->45653 45653->45655 45656 43293a CryptAcquireContextA 45653->45656 45655->45639 45657 43295b CryptGenRandom 45656->45657 45658 432956 45656->45658 45657->45658 45659 432970 CryptReleaseContext 45657->45659 45658->45655 45659->45658 45660 426030 45665 4260f7 recv 45660->45665 45666 426091 45671 42610e send 45666->45671 45672 425e56 45673 425e6b 45672->45673 45676 425f0b 45672->45676 45674 425f25 45673->45674 45675 425f5a 45673->45675 45673->45676 45677 425eb9 45673->45677 45678 425f77 45673->45678 45679 425f9e 45673->45679 45685 425eee 45673->45685 45700 424354 50 API calls _Yarn 45673->45700 45674->45675 45674->45676 45703 41f075 54 API calls 45674->45703 45675->45678 45704 424b7b 21 API calls 45675->45704 45677->45676 45677->45685 45701 41f075 54 API calls 45677->45701 45678->45676 45678->45679 45688 424f78 45678->45688 45679->45676 45705 4255c7 28 API calls 45679->45705 45685->45674 45685->45676 45702 424354 50 API calls _Yarn 45685->45702 45690 424f97 ___scrt_fastfail 45688->45690 45689 424fa6 45691 424fcb 45689->45691 45699 424fab 45689->45699 45707 41fad4 47 API calls 45689->45707 45690->45689 45690->45691 45706 41e097 21 API calls 45690->45706 45691->45679 45693 424fb4 45693->45691 45709 424185 21 API calls 2 library calls 45693->45709 45697 42504e 45697->45691 45698 431f99 21 API calls 45697->45698 45698->45699 45699->45691 45699->45693 45708 41cf6e 50 API calls 45699->45708 45700->45677 45701->45677 45702->45674 45703->45674 45704->45678 45705->45676 45706->45689 45707->45697 45708->45693 45709->45691 45710 43a998 45713 43a9a4 _swprintf ___BuildCatchObject 45710->45713 45711 43a9b2 45728 445354 20 API calls __dosmaperr 45711->45728 45713->45711 45716 43a9dc 45713->45716 45714 43a9b7 45729 43a827 26 API calls _Deallocate 45714->45729 45723 444acc EnterCriticalSection 45716->45723 45718 43a9e7 45724 43aa88 45718->45724 45720 43a9c2 __wsopen_s 45723->45718 45725 43aa96 45724->45725 45725->45725 45727 43a9f2 45725->45727 45731 448416 39 API calls 2 library calls 45725->45731 45730 43aa0f LeaveCriticalSection std::_Lockit::~_Lockit 45727->45730 45728->45714 45729->45720 45730->45720 45731->45725 45732 414dba 45747 41a51b 45732->45747 45734 414dc3 45757 401fbd 45734->45757 45738 414dde 45739 4161f2 45738->45739 45762 401eea 45738->45762 45766 401d8c 45739->45766 45742 4161fb 45743 401eea 26 API calls 45742->45743 45744 416207 45743->45744 45745 401eea 26 API calls 45744->45745 45746 416213 45745->45746 45748 41a529 45747->45748 45749 43a88c _Yarn 21 API calls 45748->45749 45750 41a533 InternetOpenW InternetOpenUrlW 45749->45750 45751 41a55c InternetReadFile 45750->45751 45755 41a57f 45751->45755 45752 41a5ac InternetCloseHandle InternetCloseHandle 45754 41a5be 45752->45754 45754->45734 45755->45751 45755->45752 45756 401eea 26 API calls 45755->45756 45772 401f86 45755->45772 45756->45755 45758 401fcc 45757->45758 45781 402501 45758->45781 45760 401fea 45761 404468 60 API calls _Yarn 45760->45761 45761->45738 45763 4021b9 45762->45763 45764 4021e8 45763->45764 45786 40262e 26 API calls _Deallocate 45763->45786 45764->45739 45767 40200a 45766->45767 45771 40203a 45767->45771 45787 402654 26 API calls 45767->45787 45769 40202b 45788 4026ba 26 API calls _Deallocate 45769->45788 45771->45742 45773 401f8e 45772->45773 45776 402325 45773->45776 45775 401fa4 45775->45755 45777 40232f 45776->45777 45779 40233a 45777->45779 45780 40294a 28 API calls 45777->45780 45779->45775 45780->45779 45782 40250d 45781->45782 45784 40252b 45782->45784 45785 40261a 28 API calls 45782->45785 45784->45760 45785->45784 45786->45764 45787->45769 45788->45771 45789 402bcc 45790 402bd7 45789->45790 45791 402bdf 45789->45791 45807 403315 28 API calls _Deallocate 45790->45807 45793 402beb 45791->45793 45797 4015d3 45791->45797 45794 402bdd 45799 43360d 45797->45799 45798 43a88c _Yarn 21 API calls 45798->45799 45799->45798 45800 402be9 45799->45800 45802 43362e std::_Facet_Register 45799->45802 45808 442200 7 API calls 2 library calls 45799->45808 45803 433dec std::_Facet_Register 45802->45803 45809 437bd7 RaiseException 45802->45809 45810 437bd7 RaiseException 45803->45810 45806 433e09 45807->45794 45808->45799 45809->45803 45810->45806 45811 4339be 45812 4339ca ___BuildCatchObject 45811->45812 45843 4336b3 45812->45843 45814 4339d1 45815 433b24 45814->45815 45818 4339fb 45814->45818 46143 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 45815->46143 45817 433b2b 46144 4426be 28 API calls _Atexit 45817->46144 45827 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 45818->45827 46137 4434d1 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 45818->46137 45820 433b31 46145 442670 28 API calls _Atexit 45820->46145 45823 433a14 45825 433a1a 45823->45825 46138 443475 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 45823->46138 45824 433b39 45833 433a9b 45827->45833 46139 43edf4 38 API calls 3 library calls 45827->46139 45854 433c5e 45833->45854 45837 433abd 45837->45817 45838 433ac1 45837->45838 45839 433aca 45838->45839 46141 442661 28 API calls _Atexit 45838->46141 46142 433842 13 API calls 2 library calls 45839->46142 45842 433ad2 45842->45825 45844 4336bc 45843->45844 46146 433e0a IsProcessorFeaturePresent 45844->46146 45846 4336c8 46147 4379ee 10 API calls 3 library calls 45846->46147 45848 4336cd 45853 4336d1 45848->45853 46148 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 45848->46148 45850 4336da 45851 4336e8 45850->45851 46149 437a17 8 API calls 3 library calls 45850->46149 45851->45814 45853->45814 46150 436050 45854->46150 45857 433aa1 45858 443422 45857->45858 46152 44ddc9 45858->46152 45860 44342b 45861 433aaa 45860->45861 46156 44e0d3 38 API calls 45860->46156 45863 40d767 45861->45863 46158 41bce3 LoadLibraryA GetProcAddress 45863->46158 45865 40d783 GetModuleFileNameW 46163 40e168 45865->46163 45867 40d79f 45868 401fbd 28 API calls 45867->45868 45869 40d7ae 45868->45869 45870 401fbd 28 API calls 45869->45870 45871 40d7bd 45870->45871 46178 41afc3 45871->46178 45875 40d7cf 45876 401d8c 26 API calls 45875->45876 45877 40d7d8 45876->45877 45878 40d835 45877->45878 45879 40d7eb 45877->45879 46203 401d64 45878->46203 46457 40e986 90 API calls 45879->46457 45882 40d845 45885 401d64 28 API calls 45882->45885 45883 40d7fd 45884 401d64 28 API calls 45883->45884 45888 40d809 45884->45888 45886 40d864 45885->45886 46208 404cbf 45886->46208 46458 40e937 68 API calls 45888->46458 45889 40d873 46212 405ce6 45889->46212 45892 40d824 46459 40e155 68 API calls 45892->46459 45893 40d87f 46215 401eef 45893->46215 45896 40d88b 45897 401eea 26 API calls 45896->45897 45898 40d894 45897->45898 45900 401eea 26 API calls 45898->45900 45899 401eea 26 API calls 45901 40dc9f 45899->45901 45902 40d89d 45900->45902 46140 433c94 GetModuleHandleW 45901->46140 45903 401d64 28 API calls 45902->45903 45904 40d8a6 45903->45904 46219 401ebd 45904->46219 45906 40d8b1 45907 401d64 28 API calls 45906->45907 45908 40d8ca 45907->45908 45909 401d64 28 API calls 45908->45909 45911 40d8e5 45909->45911 45910 40d946 45913 401d64 28 API calls 45910->45913 45928 40e134 45910->45928 45911->45910 46460 4085b4 45911->46460 45918 40d95d 45913->45918 45914 40d912 45915 401eef 26 API calls 45914->45915 45916 40d91e 45915->45916 45919 401eea 26 API calls 45916->45919 45917 40d9a4 46223 40bed7 45917->46223 45918->45917 45924 4124b7 3 API calls 45918->45924 45920 40d927 45919->45920 46464 4124b7 RegOpenKeyExA 45920->46464 45922 40d9aa 45923 40d82d 45922->45923 46226 41a463 45922->46226 45923->45899 45929 40d988 45924->45929 45927 40d9c5 45930 40da18 45927->45930 46243 40697b 45927->46243 46542 412902 30 API calls 45928->46542 45929->45917 46467 412902 30 API calls 45929->46467 45932 401d64 28 API calls 45930->45932 45935 40da21 45932->45935 45944 40da32 45935->45944 45945 40da2d 45935->45945 45937 40e14a 46543 4112b5 64 API calls ___scrt_fastfail 45937->46543 45939 40d9e4 46468 40699d 30 API calls 45939->46468 45940 40d9ee 45942 401d64 28 API calls 45940->45942 45952 40d9f7 45942->45952 45949 401d64 28 API calls 45944->45949 46471 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 45945->46471 45946 40d9e9 46469 4064d0 97 API calls 45946->46469 45950 40da3b 45949->45950 46247 41ae08 45950->46247 45952->45930 45955 40da13 45952->45955 45953 40da46 46251 401e18 45953->46251 46470 4064d0 97 API calls 45955->46470 45956 40da51 46255 401e13 45956->46255 45959 40da5a 45960 401d64 28 API calls 45959->45960 45961 40da63 45960->45961 45962 401d64 28 API calls 45961->45962 45963 40da7d 45962->45963 45964 401d64 28 API calls 45963->45964 45965 40da97 45964->45965 45966 401d64 28 API calls 45965->45966 45968 40dab0 45966->45968 45967 40db1d 45969 40db2c 45967->45969 45976 40dcaa ___scrt_fastfail 45967->45976 45968->45967 45970 401d64 28 API calls 45968->45970 45971 40db35 45969->45971 45999 40dbb1 ___scrt_fastfail 45969->45999 45974 40dac5 _wcslen 45970->45974 45972 401d64 28 API calls 45971->45972 45973 40db3e 45972->45973 45975 401d64 28 API calls 45973->45975 45974->45967 45977 401d64 28 API calls 45974->45977 45978 40db50 45975->45978 46531 41265d RegOpenKeyExA 45976->46531 45979 40dae0 45977->45979 45981 401d64 28 API calls 45978->45981 45982 401d64 28 API calls 45979->45982 45983 40db62 45981->45983 45984 40daf5 45982->45984 45986 401d64 28 API calls 45983->45986 46472 40c89e 45984->46472 45985 40dcef 45987 401d64 28 API calls 45985->45987 45988 40db8b 45986->45988 45989 40dd16 45987->45989 45993 401d64 28 API calls 45988->45993 46269 401f66 45989->46269 45992 401e18 26 API calls 45995 40db14 45992->45995 45996 40db9c 45993->45996 45998 401e13 26 API calls 45995->45998 46529 40bc67 45 API calls _wcslen 45996->46529 45997 40dd25 46273 4126d2 RegCreateKeyA 45997->46273 45998->45967 46259 4128a2 45999->46259 46003 40dc45 ctype 46008 401d64 28 API calls 46003->46008 46004 40dbac 46004->45999 46006 401d64 28 API calls 46007 40dd47 46006->46007 46279 43a5e7 46007->46279 46009 40dc5c 46008->46009 46009->45985 46013 40dc70 46009->46013 46012 40dd5e 46534 41beb0 86 API calls ___scrt_fastfail 46012->46534 46014 401d64 28 API calls 46013->46014 46017 40dc7e 46014->46017 46016 40dd81 46019 401f66 28 API calls 46016->46019 46020 41ae08 28 API calls 46017->46020 46018 40dd65 CreateThread 46018->46016 47263 41c96f 10 API calls 46018->47263 46021 40dd96 46019->46021 46022 40dc87 46020->46022 46023 401f66 28 API calls 46021->46023 46530 40e219 109 API calls 46022->46530 46026 40dda5 46023->46026 46025 40dc8c 46025->45985 46028 40dc93 46025->46028 46283 41a686 46026->46283 46028->45923 46030 401d64 28 API calls 46031 40ddb6 46030->46031 46032 401d64 28 API calls 46031->46032 46033 40ddcb 46032->46033 46034 401d64 28 API calls 46033->46034 46035 40ddeb 46034->46035 46036 43a5e7 42 API calls 46035->46036 46037 40ddf8 46036->46037 46038 401d64 28 API calls 46037->46038 46039 40de03 46038->46039 46040 401d64 28 API calls 46039->46040 46041 40de14 46040->46041 46042 401d64 28 API calls 46041->46042 46043 40de29 46042->46043 46044 401d64 28 API calls 46043->46044 46045 40de3a 46044->46045 46046 40de41 StrToIntA 46045->46046 46307 409517 46046->46307 46049 401d64 28 API calls 46050 40de5c 46049->46050 46051 40dea1 46050->46051 46052 40de68 46050->46052 46055 401d64 28 API calls 46051->46055 46535 43360d 22 API calls 3 library calls 46052->46535 46054 40de71 46057 401d64 28 API calls 46054->46057 46056 40deb1 46055->46056 46059 40def9 46056->46059 46060 40debd 46056->46060 46058 40de84 46057->46058 46061 40de8b CreateThread 46058->46061 46063 401d64 28 API calls 46059->46063 46536 43360d 22 API calls 3 library calls 46060->46536 46061->46051 47267 419128 102 API calls __EH_prolog 46061->47267 46065 40df02 46063->46065 46064 40dec6 46066 401d64 28 API calls 46064->46066 46068 40df6c 46065->46068 46069 40df0e 46065->46069 46067 40ded8 46066->46067 46071 40dedf CreateThread 46067->46071 46072 401d64 28 API calls 46068->46072 46070 401d64 28 API calls 46069->46070 46074 40df1e 46070->46074 46071->46059 47266 419128 102 API calls __EH_prolog 46071->47266 46073 40df75 46072->46073 46075 40df81 46073->46075 46076 40dfba 46073->46076 46077 401d64 28 API calls 46074->46077 46079 401d64 28 API calls 46075->46079 46332 41a7a2 GetComputerNameExW GetUserNameW 46076->46332 46080 40df33 46077->46080 46082 40df8a 46079->46082 46537 40c854 31 API calls 46080->46537 46087 401d64 28 API calls 46082->46087 46083 401e18 26 API calls 46084 40dfce 46083->46084 46086 401e13 26 API calls 46084->46086 46089 40dfd7 46086->46089 46090 40df9f 46087->46090 46088 40df46 46091 401e18 26 API calls 46088->46091 46092 40dfe0 SetProcessDEPPolicy 46089->46092 46093 40dfe3 CreateThread 46089->46093 46100 43a5e7 42 API calls 46090->46100 46094 40df52 46091->46094 46092->46093 46095 40e004 46093->46095 46096 40dff8 CreateThread 46093->46096 47235 40e54f 46093->47235 46097 401e13 26 API calls 46094->46097 46098 40e019 46095->46098 46099 40e00d CreateThread 46095->46099 46096->46095 47262 410f36 137 API calls 46096->47262 46101 40df5b CreateThread 46097->46101 46103 40e073 46098->46103 46105 401f66 28 API calls 46098->46105 46099->46098 47264 411524 38 API calls ___scrt_fastfail 46099->47264 46102 40dfac 46100->46102 46101->46068 47265 40196b 49 API calls 46101->47265 46538 40b95c 7 API calls 46102->46538 46343 41246e RegOpenKeyExA 46103->46343 46106 40e046 46105->46106 46539 404c9e 28 API calls 46106->46539 46109 40e053 46111 401f66 28 API calls 46109->46111 46113 40e062 46111->46113 46112 40e12a 46355 40cbac 46112->46355 46117 41a686 79 API calls 46113->46117 46115 41ae08 28 API calls 46116 40e0a4 46115->46116 46346 412584 RegOpenKeyExW 46116->46346 46119 40e067 46117->46119 46121 401eea 26 API calls 46119->46121 46121->46103 46124 401e13 26 API calls 46127 40e0c5 46124->46127 46125 40e0ed DeleteFileW 46126 40e0f4 46125->46126 46125->46127 46129 41ae08 28 API calls 46126->46129 46127->46125 46127->46126 46128 40e0db Sleep 46127->46128 46540 401e07 46128->46540 46131 40e104 46129->46131 46351 41297a RegOpenKeyExW 46131->46351 46133 40e117 46134 401e13 26 API calls 46133->46134 46135 40e121 46134->46135 46136 401e13 26 API calls 46135->46136 46136->46112 46137->45823 46138->45827 46139->45833 46140->45837 46141->45839 46142->45842 46143->45817 46144->45820 46145->45824 46146->45846 46147->45848 46148->45850 46149->45853 46151 433c71 GetStartupInfoW 46150->46151 46151->45857 46153 44dddb 46152->46153 46154 44ddd2 46152->46154 46153->45860 46157 44dcc8 51 API calls 5 library calls 46154->46157 46156->45860 46157->46153 46159 41bd22 LoadLibraryA GetProcAddress 46158->46159 46160 41bd12 GetModuleHandleA GetProcAddress 46158->46160 46161 41bd4b 32 API calls 46159->46161 46162 41bd3b LoadLibraryA GetProcAddress 46159->46162 46160->46159 46161->45865 46162->46161 46544 41a63f FindResourceA 46163->46544 46166 43a88c _Yarn 21 API calls 46167 40e192 _Yarn 46166->46167 46168 401f86 28 API calls 46167->46168 46169 40e1ad 46168->46169 46170 401eef 26 API calls 46169->46170 46171 40e1b8 46170->46171 46172 401eea 26 API calls 46171->46172 46173 40e1c1 46172->46173 46174 43a88c _Yarn 21 API calls 46173->46174 46175 40e1d2 _Yarn 46174->46175 46547 406052 46175->46547 46177 40e205 46177->45867 46198 41afd6 46178->46198 46179 41b046 46180 401eea 26 API calls 46179->46180 46181 41b078 46180->46181 46183 401eea 26 API calls 46181->46183 46182 41b048 46184 403b60 28 API calls 46182->46184 46186 41b080 46183->46186 46187 41b054 46184->46187 46188 401eea 26 API calls 46186->46188 46190 401eef 26 API calls 46187->46190 46189 40d7c6 46188->46189 46199 40e8bd 46189->46199 46192 41b05d 46190->46192 46191 401eef 26 API calls 46191->46198 46193 401eea 26 API calls 46192->46193 46195 41b065 46193->46195 46194 401eea 26 API calls 46194->46198 46196 41bfa9 28 API calls 46195->46196 46196->46179 46198->46179 46198->46182 46198->46191 46198->46194 46550 403b60 46198->46550 46553 41bfa9 46198->46553 46200 40e8ca 46199->46200 46202 40e8da 46200->46202 46603 40200a 26 API calls 46200->46603 46202->45875 46204 401d6c 46203->46204 46205 401d74 46204->46205 46604 401fff 28 API calls 46204->46604 46205->45882 46209 404ccb 46208->46209 46605 402e78 46209->46605 46211 404cee 46211->45889 46614 404bc4 46212->46614 46214 405cf4 46214->45893 46216 401efe 46215->46216 46218 401f0a 46216->46218 46623 4021b9 26 API calls 46216->46623 46218->45896 46221 401ec9 46219->46221 46220 401ee4 46220->45906 46221->46220 46222 402325 28 API calls 46221->46222 46222->46220 46624 401e8f 46223->46624 46225 40bee1 CreateMutexA GetLastError 46225->45922 46626 41b15b 46226->46626 46231 401eef 26 API calls 46232 41a49f 46231->46232 46233 401eea 26 API calls 46232->46233 46234 41a4a7 46233->46234 46235 41a4fa 46234->46235 46236 412513 31 API calls 46234->46236 46235->45927 46237 41a4cd 46236->46237 46238 41a4d8 StrToIntA 46237->46238 46239 41a4ef 46238->46239 46240 41a4e6 46238->46240 46242 401eea 26 API calls 46239->46242 46634 41c102 28 API calls 46240->46634 46242->46235 46244 40698f 46243->46244 46245 4124b7 3 API calls 46244->46245 46246 406996 46245->46246 46246->45939 46246->45940 46248 41ae1c 46247->46248 46635 40b027 46248->46635 46250 41ae24 46250->45953 46252 401e27 46251->46252 46254 401e33 46252->46254 46644 402121 26 API calls 46252->46644 46254->45956 46256 402121 46255->46256 46257 402150 46256->46257 46645 402718 26 API calls _Deallocate 46256->46645 46257->45959 46260 4128c0 46259->46260 46261 406052 28 API calls 46260->46261 46262 4128d5 46261->46262 46263 401fbd 28 API calls 46262->46263 46264 4128e5 46263->46264 46265 4126d2 29 API calls 46264->46265 46266 4128ef 46265->46266 46267 401eea 26 API calls 46266->46267 46268 4128fc 46267->46268 46268->46003 46270 401f6e 46269->46270 46646 402301 46270->46646 46274 412722 46273->46274 46277 4126eb 46273->46277 46275 401eea 26 API calls 46274->46275 46276 40dd3b 46275->46276 46276->46006 46278 4126fd RegSetValueExA RegCloseKey 46277->46278 46278->46274 46280 43a600 _swprintf 46279->46280 46650 43993e 46280->46650 46284 41a737 46283->46284 46285 41a69c GetLocalTime 46283->46285 46287 401eea 26 API calls 46284->46287 46286 404cbf 28 API calls 46285->46286 46288 41a6de 46286->46288 46289 41a73f 46287->46289 46290 405ce6 28 API calls 46288->46290 46291 401eea 26 API calls 46289->46291 46292 41a6ea 46290->46292 46293 40ddaa 46291->46293 46684 4027cb 46292->46684 46293->46030 46295 41a6f6 46296 405ce6 28 API calls 46295->46296 46297 41a702 46296->46297 46687 406478 76 API calls 46297->46687 46299 41a710 46300 401eea 26 API calls 46299->46300 46301 41a71c 46300->46301 46302 401eea 26 API calls 46301->46302 46303 41a725 46302->46303 46304 401eea 26 API calls 46303->46304 46305 41a72e 46304->46305 46306 401eea 26 API calls 46305->46306 46306->46284 46308 409536 _wcslen 46307->46308 46309 409541 46308->46309 46310 409558 46308->46310 46312 40c89e 31 API calls 46309->46312 46311 40c89e 31 API calls 46310->46311 46313 409560 46311->46313 46314 409549 46312->46314 46316 401e18 26 API calls 46313->46316 46315 401e18 26 API calls 46314->46315 46331 409553 46315->46331 46317 40956e 46316->46317 46318 401e13 26 API calls 46317->46318 46320 409576 46318->46320 46319 401e13 26 API calls 46321 4095ad 46319->46321 46707 40856b 28 API calls 46320->46707 46692 409837 46321->46692 46324 409588 46708 4028cf 46324->46708 46327 409593 46328 401e18 26 API calls 46327->46328 46329 40959d 46328->46329 46330 401e13 26 API calls 46329->46330 46330->46331 46331->46319 46887 403b40 46332->46887 46336 41a7fd 46337 4028cf 28 API calls 46336->46337 46338 41a807 46337->46338 46339 401e13 26 API calls 46338->46339 46340 41a810 46339->46340 46341 401e13 26 API calls 46340->46341 46342 40dfc3 46341->46342 46342->46083 46344 40e08b 46343->46344 46345 41248f RegQueryValueExA RegCloseKey 46343->46345 46344->46112 46344->46115 46345->46344 46347 4125b0 RegQueryValueExW RegCloseKey 46346->46347 46348 4125dd 46346->46348 46347->46348 46349 403b40 28 API calls 46348->46349 46350 40e0ba 46349->46350 46350->46124 46352 412992 RegDeleteValueW 46351->46352 46353 4129a6 46351->46353 46352->46353 46354 4129a2 46352->46354 46353->46133 46354->46133 46356 40cbc5 46355->46356 46357 41246e 3 API calls 46356->46357 46358 40cbcc 46357->46358 46362 40cbeb 46358->46362 46909 401602 46358->46909 46360 40cbd9 46912 4127d5 RegCreateKeyA 46360->46912 46363 413fd4 46362->46363 46364 413feb 46363->46364 46929 41aa73 46364->46929 46366 413ff6 46367 401d64 28 API calls 46366->46367 46368 41400f 46367->46368 46369 43a5e7 42 API calls 46368->46369 46370 41401c 46369->46370 46371 414021 Sleep 46370->46371 46372 41402e 46370->46372 46371->46372 46373 401f66 28 API calls 46372->46373 46374 41403d 46373->46374 46375 401d64 28 API calls 46374->46375 46376 41404b 46375->46376 46377 401fbd 28 API calls 46376->46377 46378 414053 46377->46378 46379 41afc3 28 API calls 46378->46379 46380 41405b 46379->46380 46933 404262 WSAStartup 46380->46933 46382 414065 46383 401d64 28 API calls 46382->46383 46384 41406e 46383->46384 46385 401d64 28 API calls 46384->46385 46433 4140ed 46384->46433 46386 414087 46385->46386 46387 401d64 28 API calls 46386->46387 46388 414098 46387->46388 46390 401d64 28 API calls 46388->46390 46389 41afc3 28 API calls 46389->46433 46392 4140a9 46390->46392 46391 401d64 28 API calls 46391->46433 46394 401d64 28 API calls 46392->46394 46393 4085b4 28 API calls 46393->46433 46395 4140ba 46394->46395 46397 401d64 28 API calls 46395->46397 46396 401eef 26 API calls 46396->46433 46398 4140cb 46397->46398 46399 401d64 28 API calls 46398->46399 46400 4140dd 46399->46400 47067 404101 87 API calls 46400->47067 46402 401f66 28 API calls 46402->46433 46403 41a686 79 API calls 46403->46433 46405 414244 WSAGetLastError 47068 41bc76 30 API calls 46405->47068 46410 414259 46412 41a686 79 API calls 46410->46412 46415 401d64 28 API calls 46410->46415 46416 401d8c 26 API calls 46410->46416 46418 43a5e7 42 API calls 46410->46418 46410->46433 46453 401f66 28 API calls 46410->46453 46454 414b22 CreateThread 46410->46454 46455 401eea 26 API calls 46410->46455 46456 401e13 26 API calls 46410->46456 47069 404c9e 28 API calls 46410->47069 47071 40a767 84 API calls 46410->47071 47072 4047eb 98 API calls 46410->47072 46412->46410 46414 404cbf 28 API calls 46414->46433 46415->46410 46416->46410 46417 4027cb 28 API calls 46417->46433 46420 414b80 Sleep 46418->46420 46419 405ce6 28 API calls 46419->46433 46420->46410 46421 401eea 26 API calls 46421->46433 46424 4082dc 28 API calls 46424->46433 46425 440c51 26 API calls 46425->46433 46426 401fbd 28 API calls 46426->46433 46427 41265d 3 API calls 46427->46433 46428 412513 31 API calls 46428->46433 46429 403b40 28 API calls 46429->46433 46433->46389 46433->46391 46433->46393 46433->46396 46433->46402 46433->46403 46433->46405 46433->46410 46433->46414 46433->46417 46433->46419 46433->46421 46433->46424 46433->46425 46433->46426 46433->46427 46433->46428 46433->46429 46434 41ad46 28 API calls 46433->46434 46435 401d64 28 API calls 46433->46435 46934 413f9a 46433->46934 46939 4041f1 46433->46939 46946 404915 46433->46946 46961 40428c connect 46433->46961 47021 41a96d 46433->47021 47024 413683 46433->47024 47027 40cbf1 46433->47027 47033 41adee 46433->47033 47036 41aec8 46433->47036 46434->46433 46436 4144ed GetTickCount 46435->46436 46437 41ad46 28 API calls 46436->46437 46449 414507 46437->46449 46439 41ad46 28 API calls 46439->46449 46441 41aec8 28 API calls 46441->46449 46444 405ce6 28 API calls 46444->46449 46445 4027cb 28 API calls 46445->46449 46446 40275c 28 API calls 46446->46449 46448 401eea 26 API calls 46448->46449 46449->46439 46449->46441 46449->46444 46449->46445 46449->46446 46449->46448 46450 401e13 26 API calls 46449->46450 47040 41aca0 46449->47040 47042 41ac52 46449->47042 47047 40e679 GetLocaleInfoA 46449->47047 47050 4027ec 28 API calls 46449->47050 47051 4045d5 46449->47051 47070 404468 60 API calls _Yarn 46449->47070 46450->46449 46453->46410 46454->46410 47228 419e89 103 API calls 46454->47228 46455->46410 46456->46410 46457->45883 46458->45892 46461 4085c0 46460->46461 46462 402e78 28 API calls 46461->46462 46463 4085e4 46462->46463 46463->45914 46465 4124e1 RegQueryValueExA RegCloseKey 46464->46465 46466 41250b 46464->46466 46465->46466 46466->45910 46467->45917 46468->45946 46469->45940 46470->45930 46471->45944 46473 40c8ba 46472->46473 46474 40c8da 46473->46474 46475 40c90f 46473->46475 46479 40c8d0 46473->46479 47229 41a74b 29 API calls 46474->47229 46478 41b15b GetCurrentProcess 46475->46478 46477 40ca03 GetLongPathNameW 46481 403b40 28 API calls 46477->46481 46482 40c914 46478->46482 46479->46477 46480 40c8e3 46483 401e18 26 API calls 46480->46483 46484 40ca18 46481->46484 46485 40c918 46482->46485 46486 40c96a 46482->46486 46488 40c8ed 46483->46488 46489 403b40 28 API calls 46484->46489 46487 403b40 28 API calls 46485->46487 46490 403b40 28 API calls 46486->46490 46492 40c926 46487->46492 46494 401e13 26 API calls 46488->46494 46493 40ca27 46489->46493 46491 40c978 46490->46491 46498 403b40 28 API calls 46491->46498 46499 403b40 28 API calls 46492->46499 47232 40cc37 28 API calls 46493->47232 46494->46479 46496 40ca3a 47233 402860 28 API calls 46496->47233 46501 40c98e 46498->46501 46502 40c93c 46499->46502 46500 40ca45 47234 402860 28 API calls 46500->47234 47231 402860 28 API calls 46501->47231 47230 402860 28 API calls 46502->47230 46506 40ca4f 46509 401e13 26 API calls 46506->46509 46507 40c999 46510 401e18 26 API calls 46507->46510 46508 40c947 46511 401e18 26 API calls 46508->46511 46512 40ca59 46509->46512 46513 40c9a4 46510->46513 46514 40c952 46511->46514 46515 401e13 26 API calls 46512->46515 46516 401e13 26 API calls 46513->46516 46517 401e13 26 API calls 46514->46517 46518 40ca62 46515->46518 46519 40c9ad 46516->46519 46520 40c95b 46517->46520 46521 401e13 26 API calls 46518->46521 46522 401e13 26 API calls 46519->46522 46523 401e13 26 API calls 46520->46523 46524 40ca6b 46521->46524 46522->46488 46523->46488 46525 401e13 26 API calls 46524->46525 46526 40ca74 46525->46526 46527 401e13 26 API calls 46526->46527 46528 40ca7d 46527->46528 46528->45992 46529->46004 46530->46025 46532 412683 RegQueryValueExA RegCloseKey 46531->46532 46533 4126a7 46531->46533 46532->46533 46533->45985 46534->46018 46535->46054 46536->46064 46537->46088 46538->46076 46539->46109 46541 401e0c 46540->46541 46542->45937 46545 40e183 46544->46545 46546 41a65c LoadResource LockResource SizeofResource 46544->46546 46545->46166 46546->46545 46548 401f86 28 API calls 46547->46548 46549 406066 46548->46549 46549->46177 46560 403c30 46550->46560 46554 41bfae 46553->46554 46555 41bfd2 46554->46555 46556 41bfcb 46554->46556 46576 41c552 46555->46576 46595 41bfe3 28 API calls 46556->46595 46558 41bfd0 46558->46198 46561 403c39 46560->46561 46564 403c59 46561->46564 46565 403c68 46564->46565 46570 4032a4 46565->46570 46567 403c74 46568 402325 28 API calls 46567->46568 46569 403b73 46568->46569 46569->46198 46571 4032b0 46570->46571 46572 4032ad 46570->46572 46575 4032b6 28 API calls 46571->46575 46572->46567 46577 41c55c __EH_prolog 46576->46577 46578 41c673 46577->46578 46579 41c595 46577->46579 46602 402649 28 API calls std::_Xinvalid_argument 46578->46602 46596 4026a7 28 API calls 46579->46596 46583 41c5a9 46597 41c536 28 API calls 46583->46597 46585 41c5dc 46586 41c603 46585->46586 46587 41c5f7 46585->46587 46599 41c7cf 26 API calls 46586->46599 46598 41c7b2 26 API calls 46587->46598 46590 41c601 46601 41c75a 26 API calls 46590->46601 46591 41c60f 46600 41c7cf 26 API calls 46591->46600 46594 41c63e 46594->46558 46595->46558 46596->46583 46597->46585 46598->46590 46599->46591 46600->46590 46601->46594 46603->46202 46606 402e85 46605->46606 46607 402ea9 46606->46607 46608 402e98 46606->46608 46610 402eae 46606->46610 46607->46211 46612 403445 28 API calls 46608->46612 46610->46607 46613 40225b 26 API calls 46610->46613 46612->46607 46613->46607 46615 404bd0 46614->46615 46618 40245c 46615->46618 46617 404be4 46617->46214 46619 402469 46618->46619 46621 402478 46619->46621 46622 402ad3 28 API calls 46619->46622 46621->46617 46622->46621 46623->46218 46625 401e94 46624->46625 46627 41a471 46626->46627 46628 41b168 GetCurrentProcess 46626->46628 46629 412513 RegOpenKeyExA 46627->46629 46628->46627 46630 412541 RegQueryValueExA RegCloseKey 46629->46630 46631 412569 46629->46631 46630->46631 46632 401f66 28 API calls 46631->46632 46633 41257e 46632->46633 46633->46231 46634->46239 46636 40b02f 46635->46636 46639 40b04b 46636->46639 46638 40b045 46638->46250 46640 40b055 46639->46640 46642 40b060 46640->46642 46643 40b138 28 API calls 46640->46643 46642->46638 46643->46642 46644->46254 46645->46257 46647 40230d 46646->46647 46648 402325 28 API calls 46647->46648 46649 401f80 46648->46649 46649->45997 46668 43a545 46650->46668 46652 43998b 46677 4392de 38 API calls 3 library calls 46652->46677 46654 439950 46654->46652 46655 439965 46654->46655 46667 40dd54 46654->46667 46675 445354 20 API calls __dosmaperr 46655->46675 46656 439997 46661 4399c6 46656->46661 46678 43a58a 42 API calls __Toupper 46656->46678 46658 43996a 46676 43a827 26 API calls _Deallocate 46658->46676 46664 439a32 46661->46664 46679 43a4f1 26 API calls 2 library calls 46661->46679 46680 43a4f1 26 API calls 2 library calls 46664->46680 46665 439af9 _swprintf 46665->46667 46681 445354 20 API calls __dosmaperr 46665->46681 46667->46012 46667->46016 46669 43a54a 46668->46669 46670 43a55d 46668->46670 46682 445354 20 API calls __dosmaperr 46669->46682 46670->46654 46672 43a54f 46683 43a827 26 API calls _Deallocate 46672->46683 46674 43a55a 46674->46654 46675->46658 46676->46667 46677->46656 46678->46656 46679->46664 46680->46665 46681->46667 46682->46672 46683->46674 46688 401e9b 46684->46688 46686 4027d9 46686->46295 46687->46299 46689 401ea7 46688->46689 46690 40245c 28 API calls 46689->46690 46691 401eb9 46690->46691 46691->46686 46693 409855 46692->46693 46694 4124b7 3 API calls 46693->46694 46695 40985c 46694->46695 46696 409870 46695->46696 46697 40988a 46695->46697 46698 4095cf 46696->46698 46699 409875 46696->46699 46711 4082dc 46697->46711 46698->46049 46701 4082dc 28 API calls 46699->46701 46703 409883 46701->46703 46737 409959 29 API calls 46703->46737 46706 409888 46706->46698 46707->46324 46878 402d8b 46708->46878 46710 4028dd 46710->46327 46712 4082eb 46711->46712 46738 408431 46712->46738 46714 408309 46715 4098a5 46714->46715 46743 40affa 46715->46743 46718 4098f6 46720 401f66 28 API calls 46718->46720 46719 4098ce 46721 401f66 28 API calls 46719->46721 46722 409901 46720->46722 46723 4098d8 46721->46723 46724 401f66 28 API calls 46722->46724 46725 41ae08 28 API calls 46723->46725 46726 409910 46724->46726 46727 4098e6 46725->46727 46729 41a686 79 API calls 46726->46729 46747 40a876 31 API calls _Yarn 46727->46747 46731 409915 CreateThread 46729->46731 46730 4098ed 46732 401eea 26 API calls 46730->46732 46733 409930 CreateThread 46731->46733 46734 40993c CreateThread 46731->46734 46759 4099a9 46731->46759 46732->46718 46733->46734 46756 409993 46733->46756 46735 401e13 26 API calls 46734->46735 46753 4099b5 46734->46753 46736 409950 46735->46736 46736->46698 46737->46706 46877 40999f 135 API calls 46737->46877 46739 40843d 46738->46739 46741 40845b 46739->46741 46742 402f0d 28 API calls 46739->46742 46741->46714 46742->46741 46745 40b006 46743->46745 46744 4098c3 46744->46718 46744->46719 46745->46744 46748 403b9e 46745->46748 46747->46730 46749 403ba8 46748->46749 46751 403bb3 46749->46751 46752 403cfd 28 API calls 46749->46752 46751->46744 46752->46751 46762 40a3f4 46753->46762 46811 4099e4 46756->46811 46832 409e48 46759->46832 46768 40a402 46762->46768 46763 4099be 46764 40a45c Sleep GetForegroundWindow GetWindowTextLengthW 46765 40b027 28 API calls 46764->46765 46765->46768 46768->46763 46768->46764 46770 40a4a2 GetWindowTextW 46768->46770 46772 40a5ff 46768->46772 46773 41aca0 GetTickCount 46768->46773 46774 40affa 28 API calls 46768->46774 46776 40a569 Sleep 46768->46776 46779 401f66 28 API calls 46768->46779 46783 405ce6 28 API calls 46768->46783 46785 4028cf 28 API calls 46768->46785 46786 40a4f1 46768->46786 46787 41ae08 28 API calls 46768->46787 46788 409d58 27 API calls 46768->46788 46789 401e13 26 API calls 46768->46789 46790 401eea 26 API calls 46768->46790 46791 433519 5 API calls __Init_thread_wait 46768->46791 46792 4338a5 29 API calls __onexit 46768->46792 46793 4334cf EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 46768->46793 46794 4082a8 28 API calls 46768->46794 46796 40b0dd 28 API calls 46768->46796 46797 40ae58 44 API calls 2 library calls 46768->46797 46798 440c51 46768->46798 46802 404c9e 28 API calls 46768->46802 46770->46768 46775 401e13 26 API calls 46772->46775 46773->46768 46774->46768 46775->46763 46776->46768 46779->46768 46780 4082dc 28 API calls 46780->46786 46783->46768 46785->46768 46786->46768 46786->46780 46795 40a876 31 API calls _Yarn 46786->46795 46787->46768 46788->46768 46789->46768 46790->46768 46791->46768 46792->46768 46793->46768 46794->46768 46795->46786 46796->46768 46797->46768 46799 440c5d 46798->46799 46803 440a4d 46799->46803 46802->46768 46804 440a64 46803->46804 46808 440aa5 46804->46808 46809 445354 20 API calls __dosmaperr 46804->46809 46806 440a9b 46810 43a827 26 API calls _Deallocate 46806->46810 46808->46768 46809->46806 46810->46808 46812 409a63 GetMessageA 46811->46812 46813 4099ff GetModuleHandleA SetWindowsHookExA 46811->46813 46815 409a75 TranslateMessage DispatchMessageA 46812->46815 46817 40999c 46812->46817 46813->46812 46814 409a1b GetLastError 46813->46814 46826 41ad46 46814->46826 46815->46812 46815->46817 46820 409a3e 46821 401f66 28 API calls 46820->46821 46822 409a4d 46821->46822 46823 41a686 79 API calls 46822->46823 46824 409a52 46823->46824 46825 401eea 26 API calls 46824->46825 46825->46817 46827 440c51 26 API calls 46826->46827 46828 41ad67 46827->46828 46829 401f66 28 API calls 46828->46829 46830 409a31 46829->46830 46831 404c9e 28 API calls 46830->46831 46831->46820 46833 409e5d Sleep 46832->46833 46852 409d97 46833->46852 46835 4099b2 46836 409e9d CreateDirectoryW 46841 409e6f 46836->46841 46837 409eae GetFileAttributesW 46837->46841 46838 401d64 28 API calls 46838->46841 46839 409ec5 SetFileAttributesW 46839->46841 46841->46833 46841->46835 46841->46836 46841->46837 46841->46838 46841->46839 46843 409f10 46841->46843 46865 41b58f 46841->46865 46842 409f3f PathFileExistsW 46842->46843 46843->46842 46845 401f86 28 API calls 46843->46845 46846 40a048 SetFileAttributesW 46843->46846 46847 401eea 26 API calls 46843->46847 46848 406052 28 API calls 46843->46848 46849 401eef 26 API calls 46843->46849 46851 401eea 26 API calls 46843->46851 46874 41b61a 32 API calls 46843->46874 46875 41b687 CreateFileW SetFilePointer WriteFile CloseHandle 46843->46875 46845->46843 46846->46841 46847->46843 46848->46843 46849->46843 46851->46841 46853 409e44 46852->46853 46855 409dad 46852->46855 46853->46841 46854 409dcc CreateFileW 46854->46855 46856 409dda GetFileSize 46854->46856 46855->46854 46857 409e0f CloseHandle 46855->46857 46858 409e21 46855->46858 46859 409e04 Sleep 46855->46859 46860 409dfd 46855->46860 46856->46855 46856->46857 46857->46855 46858->46853 46862 4082dc 28 API calls 46858->46862 46859->46857 46876 40a7f0 83 API calls 46860->46876 46863 409e3d 46862->46863 46864 4098a5 126 API calls 46863->46864 46864->46853 46866 41b5a2 CreateFileW 46865->46866 46868 41b5db 46866->46868 46869 41b5df 46866->46869 46868->46841 46870 41b5f6 WriteFile 46869->46870 46871 41b5e6 SetFilePointer 46869->46871 46872 41b60b CloseHandle 46870->46872 46873 41b609 46870->46873 46871->46870 46871->46872 46872->46868 46873->46872 46874->46843 46875->46843 46876->46859 46879 402d97 46878->46879 46882 4030f7 46879->46882 46881 402dab 46881->46710 46883 403101 46882->46883 46885 403115 46883->46885 46886 4036c2 28 API calls 46883->46886 46885->46881 46886->46885 46888 403b48 46887->46888 46894 403b7a 46888->46894 46891 403cbb 46898 403dc2 46891->46898 46893 403cc9 46893->46336 46895 403b86 46894->46895 46896 403b9e 28 API calls 46895->46896 46897 403b5a 46896->46897 46897->46891 46899 403dce 46898->46899 46902 402ffd 46899->46902 46901 403de3 46901->46893 46903 40300e 46902->46903 46904 4032a4 28 API calls 46903->46904 46905 40301a 46904->46905 46907 40302e 46905->46907 46908 4035e8 28 API calls 46905->46908 46907->46901 46908->46907 46915 4395ba 46909->46915 46913 412814 46912->46913 46914 4127ed RegSetValueExA RegCloseKey 46912->46914 46913->46362 46914->46913 46918 43953b 46915->46918 46917 401608 46917->46360 46919 43954a 46918->46919 46920 43955e 46918->46920 46926 445354 20 API calls __dosmaperr 46919->46926 46924 43955a __alldvrm 46920->46924 46928 447601 11 API calls 2 library calls 46920->46928 46923 43954f 46927 43a827 26 API calls _Deallocate 46923->46927 46924->46917 46926->46923 46927->46924 46928->46924 46932 41aab9 _Yarn ___scrt_fastfail 46929->46932 46930 401f66 28 API calls 46931 41ab2e 46930->46931 46931->46366 46932->46930 46933->46382 46935 413fb3 getaddrinfo WSASetLastError 46934->46935 46936 413fa9 46934->46936 46935->46433 47073 413e37 35 API calls ___std_exception_copy 46936->47073 46938 413fae 46938->46935 46940 404206 socket 46939->46940 46941 4041fd 46939->46941 46943 404220 46940->46943 46944 404224 CreateEventW 46940->46944 47074 404262 WSAStartup 46941->47074 46943->46433 46944->46433 46945 404202 46945->46940 46945->46943 46947 40492a 46946->46947 46948 4049b1 46946->46948 46949 404933 46947->46949 46950 404987 CreateEventA CreateThread 46947->46950 46951 404942 GetLocalTime 46947->46951 46948->46433 46949->46950 46950->46948 47076 404b1d 46950->47076 46952 41ad46 28 API calls 46951->46952 46953 40495b 46952->46953 47075 404c9e 28 API calls 46953->47075 46955 404968 46956 401f66 28 API calls 46955->46956 46957 404977 46956->46957 46958 41a686 79 API calls 46957->46958 46959 40497c 46958->46959 46960 401eea 26 API calls 46959->46960 46960->46950 46962 4043e1 46961->46962 46963 4042b3 46961->46963 46964 4043e7 WSAGetLastError 46962->46964 47015 404343 46962->47015 46965 4042e8 46963->46965 46967 404cbf 28 API calls 46963->46967 46963->47015 46966 4043f7 46964->46966 46964->47015 47080 420151 27 API calls 46965->47080 46968 4042f7 46966->46968 46969 4043fc 46966->46969 46971 4042d4 46967->46971 46974 401f66 28 API calls 46968->46974 47085 41bc76 30 API calls 46969->47085 46975 401f66 28 API calls 46971->46975 46973 4042f0 46973->46968 46977 404306 46973->46977 46978 404448 46974->46978 46979 4042e3 46975->46979 46976 40440b 47086 404c9e 28 API calls 46976->47086 46986 404315 46977->46986 46987 40434c 46977->46987 46981 401f66 28 API calls 46978->46981 46982 41a686 79 API calls 46979->46982 46984 404457 46981->46984 46982->46965 46983 404418 46985 401f66 28 API calls 46983->46985 46989 41a686 79 API calls 46984->46989 46990 404427 46985->46990 46988 401f66 28 API calls 46986->46988 47082 420f34 56 API calls 46987->47082 46992 404324 46988->46992 46989->47015 46993 41a686 79 API calls 46990->46993 46995 401f66 28 API calls 46992->46995 46996 40442c 46993->46996 46994 404354 46997 404389 46994->46997 46998 404359 46994->46998 46999 404333 46995->46999 47001 401eea 26 API calls 46996->47001 47084 4202ea 28 API calls 46997->47084 47002 401f66 28 API calls 46998->47002 47003 41a686 79 API calls 46999->47003 47001->47015 47004 404368 47002->47004 47005 404338 47003->47005 47008 401f66 28 API calls 47004->47008 47081 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47005->47081 47006 404391 47007 4043be CreateEventW CreateEventW 47006->47007 47010 401f66 28 API calls 47006->47010 47007->47015 47009 404377 47008->47009 47011 41a686 79 API calls 47009->47011 47013 4043a7 47010->47013 47014 40437c 47011->47014 47016 401f66 28 API calls 47013->47016 47083 420592 54 API calls 47014->47083 47015->46433 47018 4043b6 47016->47018 47019 41a686 79 API calls 47018->47019 47020 4043bb 47019->47020 47020->47007 47087 41a945 GlobalMemoryStatusEx 47021->47087 47023 41a982 47023->46433 47088 413646 47024->47088 47028 40cc0d 47027->47028 47029 41246e 3 API calls 47028->47029 47031 40cc14 47029->47031 47030 40cc2c 47030->46433 47031->47030 47032 4124b7 3 API calls 47031->47032 47032->47030 47034 401f86 28 API calls 47033->47034 47035 41ae03 47034->47035 47035->46433 47037 41aed5 47036->47037 47038 401f86 28 API calls 47037->47038 47039 41aee7 47038->47039 47039->46433 47041 41acb6 GetTickCount 47040->47041 47041->46449 47043 436050 ___scrt_fastfail 47042->47043 47044 41ac71 GetForegroundWindow GetWindowTextW 47043->47044 47045 403b40 28 API calls 47044->47045 47046 41ac9b 47045->47046 47046->46449 47048 401f66 28 API calls 47047->47048 47049 40e69e 47048->47049 47049->46449 47050->46449 47064 4045ec 47051->47064 47052 43a88c _Yarn 21 API calls 47052->47064 47054 40465b 47056 404666 47054->47056 47054->47064 47055 401f86 28 API calls 47055->47064 47141 4047eb 98 API calls 47056->47141 47057 401eef 26 API calls 47057->47064 47059 40466d 47061 401eea 26 API calls 47059->47061 47060 401eea 26 API calls 47060->47064 47062 404676 47061->47062 47063 401eea 26 API calls 47062->47063 47065 40467f 47063->47065 47064->47052 47064->47054 47064->47055 47064->47057 47064->47060 47129 404688 47064->47129 47140 40455b 59 API calls 47064->47140 47065->46410 47067->46433 47068->46410 47069->46410 47070->46449 47071->46410 47072->46410 47073->46938 47074->46945 47075->46955 47079 404b29 101 API calls 47076->47079 47078 404b26 47079->47078 47080->46973 47081->47015 47082->46994 47083->47005 47084->47006 47085->46976 47086->46983 47087->47023 47091 413619 47088->47091 47092 41362e ___scrt_initialize_default_local_stdio_options 47091->47092 47095 43e2dd 47092->47095 47098 43b030 47095->47098 47099 43b070 47098->47099 47100 43b058 47098->47100 47099->47100 47101 43b078 47099->47101 47122 445354 20 API calls __dosmaperr 47100->47122 47124 4392de 38 API calls 3 library calls 47101->47124 47104 43b05d 47123 43a827 26 API calls _Deallocate 47104->47123 47105 43b088 47125 43b7b6 20 API calls 2 library calls 47105->47125 47107 43b068 47115 433d2c 47107->47115 47110 41363c 47110->46433 47111 43b100 47126 43be24 50 API calls 3 library calls 47111->47126 47114 43b10b 47127 43b820 20 API calls _free 47114->47127 47116 433d37 IsProcessorFeaturePresent 47115->47116 47117 433d35 47115->47117 47119 4341a4 47116->47119 47117->47110 47128 434168 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47119->47128 47121 434287 47121->47110 47122->47104 47123->47107 47124->47105 47125->47111 47126->47114 47127->47107 47128->47121 47139 4046a3 47129->47139 47130 4047d8 47131 401eea 26 API calls 47130->47131 47132 4047e1 47131->47132 47132->47054 47133 403b60 28 API calls 47133->47139 47134 401eef 26 API calls 47134->47139 47135 401eea 26 API calls 47135->47139 47136 401fbd 28 API calls 47136->47139 47137 401ebd 28 API calls 47138 404772 CreateEventA CreateThread WaitForSingleObject CloseHandle 47137->47138 47138->47139 47142 414b9b 47138->47142 47139->47130 47139->47133 47139->47134 47139->47135 47139->47136 47139->47137 47140->47064 47141->47059 47143 401fbd 28 API calls 47142->47143 47144 414bbd SetEvent 47143->47144 47145 414bd2 47144->47145 47146 403b60 28 API calls 47145->47146 47147 414bec 47146->47147 47148 401fbd 28 API calls 47147->47148 47149 414bfc 47148->47149 47150 401fbd 28 API calls 47149->47150 47151 414c0e 47150->47151 47152 41afc3 28 API calls 47151->47152 47153 414c17 47152->47153 47154 4161f2 47153->47154 47156 414de3 47153->47156 47157 414c37 GetTickCount 47153->47157 47155 401d8c 26 API calls 47154->47155 47158 4161fb 47155->47158 47156->47154 47220 414d99 47156->47220 47159 41ad46 28 API calls 47157->47159 47160 401eea 26 API calls 47158->47160 47161 414c4d 47159->47161 47163 416207 47160->47163 47164 41aca0 GetTickCount 47161->47164 47165 401eea 26 API calls 47163->47165 47166 414c54 47164->47166 47167 416213 47165->47167 47168 41ad46 28 API calls 47166->47168 47169 414c5f 47168->47169 47170 41ac52 30 API calls 47169->47170 47171 414c6d 47170->47171 47172 41aec8 28 API calls 47171->47172 47173 414c7b 47172->47173 47174 401d64 28 API calls 47173->47174 47175 414c89 47174->47175 47221 4027ec 28 API calls 47175->47221 47177 414c97 47222 40275c 28 API calls 47177->47222 47179 414ca6 47180 4027cb 28 API calls 47179->47180 47181 414cb5 47180->47181 47223 40275c 28 API calls 47181->47223 47183 414cc4 47184 4027cb 28 API calls 47183->47184 47185 414cd0 47184->47185 47224 40275c 28 API calls 47185->47224 47187 414cda 47225 404468 60 API calls _Yarn 47187->47225 47189 414ce9 47190 401eea 26 API calls 47189->47190 47191 414cf2 47190->47191 47192 401eea 26 API calls 47191->47192 47193 414cfe 47192->47193 47194 401eea 26 API calls 47193->47194 47195 414d0a 47194->47195 47196 401eea 26 API calls 47195->47196 47197 414d16 47196->47197 47198 401eea 26 API calls 47197->47198 47199 414d22 47198->47199 47200 401eea 26 API calls 47199->47200 47201 414d2e 47200->47201 47202 401e13 26 API calls 47201->47202 47203 414d3a 47202->47203 47204 401eea 26 API calls 47203->47204 47205 414d43 47204->47205 47206 401eea 26 API calls 47205->47206 47207 414d4c 47206->47207 47208 401d64 28 API calls 47207->47208 47209 414d57 47208->47209 47210 43a5e7 42 API calls 47209->47210 47211 414d64 47210->47211 47212 414d69 47211->47212 47213 414d8f 47211->47213 47215 414d82 47212->47215 47216 414d77 47212->47216 47214 401d64 28 API calls 47213->47214 47214->47220 47217 404915 104 API calls 47215->47217 47226 4049ba 81 API calls 47216->47226 47219 414d7d 47217->47219 47219->47154 47220->47154 47227 404ab1 83 API calls 47220->47227 47221->47177 47222->47179 47223->47183 47224->47187 47225->47189 47226->47219 47227->47219 47229->46480 47230->46508 47231->46507 47232->46496 47233->46500 47234->46506 47237 40e56a 47235->47237 47236 4124b7 3 API calls 47236->47237 47237->47236 47238 40e60e 47237->47238 47241 40e5fe Sleep 47237->47241 47257 40e59c 47237->47257 47240 4082dc 28 API calls 47238->47240 47239 4082dc 28 API calls 47239->47257 47243 40e619 47240->47243 47241->47237 47242 41ae08 28 API calls 47242->47257 47245 41ae08 28 API calls 47243->47245 47246 40e625 47245->47246 47270 412774 29 API calls 47246->47270 47249 401e13 26 API calls 47249->47257 47250 40e638 47251 401e13 26 API calls 47250->47251 47253 40e644 47251->47253 47252 401f66 28 API calls 47252->47257 47254 401f66 28 API calls 47253->47254 47255 40e655 47254->47255 47258 4126d2 29 API calls 47255->47258 47256 4126d2 29 API calls 47256->47257 47257->47239 47257->47241 47257->47242 47257->47249 47257->47252 47257->47256 47268 40bf04 73 API calls ___scrt_fastfail 47257->47268 47269 412774 29 API calls 47257->47269 47259 40e668 47258->47259 47271 411699 TerminateProcess WaitForSingleObject 47259->47271 47261 40e670 ExitProcess 47272 411637 61 API calls 47262->47272 47269->47257 47270->47250 47271->47261

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                                                                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                                                                                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                                                                                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                                                                                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                                                                                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                                                                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                                                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                                                                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                                                                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                                                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                                                                                                                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                                                                                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                                                                                                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                                                                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                                                                                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressProc$HandleLibraryLoadModule
                                                                                                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                                  • API String ID: 384173800-625181639
                                                                                                                  • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                                                  • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                                                                                                  • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                                                  • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1259 4099e4-4099fd 1260 409a63-409a73 GetMessageA 1259->1260 1261 4099ff-409a19 GetModuleHandleA SetWindowsHookExA 1259->1261 1263 409a75-409a8d TranslateMessage DispatchMessageA 1260->1263 1264 409a8f 1260->1264 1261->1260 1262 409a1b-409a61 GetLastError call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1261->1262 1266 409a91-409a96 1262->1266 1263->1260 1263->1264 1264->1266
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                                                                  • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                                                                  • GetLastError.KERNEL32 ref: 00409A1B
                                                                                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                                                                  • TranslateMessage.USER32(?), ref: 00409A7A
                                                                                                                  • DispatchMessageA.USER32(?), ref: 00409A85
                                                                                                                  Strings
                                                                                                                  • Keylogger initialization failure: error , xrefs: 00409A32
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                                  • String ID: Keylogger initialization failure: error
                                                                                                                  • API String ID: 3219506041-952744263
                                                                                                                  • Opcode ID: 04eaad81753b9e27949701049d8d5bd2de999136c2a6d130b4221f81ecb2367e
                                                                                                                  • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                                                                                                  • Opcode Fuzzy Hash: 04eaad81753b9e27949701049d8d5bd2de999136c2a6d130b4221f81ecb2367e
                                                                                                                  • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                                    • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                                    • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                                                  • Sleep.KERNEL32(00000BB8), ref: 0040E603
                                                                                                                  • ExitProcess.KERNEL32 ref: 0040E672
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                                  • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                                                                                                  • API String ID: 2281282204-3981147832
                                                                                                                  • Opcode ID: dca5ffa1f26a58f88eabcf4e1c6adf70a88f5eb93220c74e9f8d60f60b37ffdd
                                                                                                                  • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                                                                                                  • Opcode Fuzzy Hash: dca5ffa1f26a58f88eabcf4e1c6adf70a88f5eb93220c74e9f8d60f60b37ffdd
                                                                                                                  • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1419 404915-404924 1420 4049b1 1419->1420 1421 40492a-404931 1419->1421 1422 4049b3-4049b7 1420->1422 1423 404933-404937 1421->1423 1424 404939-404940 1421->1424 1425 404987-4049af CreateEventA CreateThread 1423->1425 1424->1425 1426 404942-404982 GetLocalTime call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1424->1426 1425->1422 1426->1425
                                                                                                                  APIs
                                                                                                                  • GetLocalTime.KERNEL32(00000001,00473EE8,004745A8,00000000,?,?,?,?,?,00414D8A,?,00000001), ref: 00404946
                                                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00473EE8,004745A8,00000000,?,?,?,?,?,00414D8A,?,00000001), ref: 00404994
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                                                                                                  Strings
                                                                                                                  • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Create$EventLocalThreadTime
                                                                                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                                                                                  • API String ID: 2532271599-1507639952
                                                                                                                  • Opcode ID: ee3ad1be35f4293743414279c88800ade4f2d806fe95fc1c64c02c4606088ff0
                                                                                                                  • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                                                                                                  • Opcode Fuzzy Hash: ee3ad1be35f4293743414279c88800ade4f2d806fe95fc1c64c02c4606088ff0
                                                                                                                  • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                                                                                                  APIs
                                                                                                                  • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                                                                                                                  • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                                                                                                                  • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1815803762-0
                                                                                                                  • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                                                  • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                                                                                                  • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                                                  • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                                                                                                  APIs
                                                                                                                  • GetComputerNameExW.KERNEL32(00000001,?,0000002B,00474358), ref: 0041A7BF
                                                                                                                  • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Name$ComputerUser
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4229901323-0
                                                                                                                  • Opcode ID: d080141cef9e3990b2f6bec53120ee530cdf67b1126702e4f13589ad74e7334c
                                                                                                                  • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                                                                                                  • Opcode Fuzzy Hash: d080141cef9e3990b2f6bec53120ee530cdf67b1126702e4f13589ad74e7334c
                                                                                                                  • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                                                                                                                  APIs
                                                                                                                  • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: InfoLocale
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2299586839-0
                                                                                                                  • Opcode ID: cfd0bc145c26702e1739b42b90775f026f17fa5d8f36fb20b32d05d25c771de3
                                                                                                                  • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                                                                                                  • Opcode Fuzzy Hash: cfd0bc145c26702e1739b42b90775f026f17fa5d8f36fb20b32d05d25c771de3
                                                                                                                  • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: recv
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1507349165-0
                                                                                                                  • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                                                                  • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                                                                                                                  • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                                                                  • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 5 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c call 43e820 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 49 40dc96-40dca7 call 401eea 23->49 79 40d9a5-40d9ac call 40bed7 69->79 80 40d96d-40d98c call 401e8f call 4124b7 69->80 70->69 102 40e134-40e154 call 401e8f call 412902 call 4112b5 70->102 88 40d9b5-40d9bc 79->88 89 40d9ae-40d9b0 79->89 80->79 98 40d98e-40d9a4 call 401e8f call 412902 80->98 93 40d9c0-40d9cc call 41a463 88->93 94 40d9be 88->94 92 40dc95 89->92 92->49 103 40d9d5-40d9d9 93->103 104 40d9ce-40d9d0 93->104 94->93 98->79 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 127 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->127 128 40da2d call 4069ba 107->128 117 40d9e0-40d9e2 108->117 121 40d9e4-40d9e9 call 40699d call 4064d0 117->121 122 40d9ee-40da01 call 401d64 call 401e8f 117->122 121->122 122->107 138 40da03-40da09 122->138 163 40db22-40db26 127->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a611 127->164 128->127 138->107 140 40da0b-40da11 138->140 140->107 142 40da13 call 4064d0 140->142 142->107 165 40dcaa-40dd01 call 436050 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->165 166 40db2c-40db33 163->166 164->163 188 40dad7-40db1d call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->188 219 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5e7 165->219 168 40dbb1-40dbbb call 4082d7 166->168 169 40db35-40dbaf call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 166->169 178 40dbc0-40dbe4 call 4022f8 call 4338c8 168->178 169->178 196 40dbf3 178->196 197 40dbe6-40dbf1 call 436050 178->197 188->163 202 40dbf5-40dc40 call 401e07 call 43e349 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 196->202 197->202 257 40dc45-40dc6a call 4338d1 call 401d64 call 40b125 202->257 272 40dd79-40dd7b 219->272 273 40dd5e 219->273 257->219 274 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 257->274 276 40dd81 272->276 277 40dd7d-40dd7f 272->277 275 40dd60-40dd77 call 41beb0 CreateThread 273->275 274->219 292 40dc93 274->292 280 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43360d call 401d64 call 401e8f CreateThread 280->331 292->92 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 342 40def9-40df0c call 401d64 call 401e8f 333->342 343 40debd-40def4 call 43360d call 401d64 call 401e8f CreateThread 333->343 354 40df6c-40df7f call 401d64 call 401e8f 342->354 355 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 342->355 343->342 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 40b95c 354->365 366 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 354->366 355->354 365->366 386 40dfe0-40dfe1 SetProcessDEPPolicy 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 399->404 414 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 401->414 415 40e12a-40e12f call 40cbac call 413fd4 401->415 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 414->433 415->102 434 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->415 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                                                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                                                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                                                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                                                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                                                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                                                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                                                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                                                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                                                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SC_TR126089907.exe,00000104), ref: 0040D790
                                                                                                                    • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                                                  • String ID: (CG$(CG$0DG$@CG$@CG$Access Level: $Administrator$C:\Users\user\Desktop\SC_TR126089907.exe$Exe$Inj$Remcos Agent initialized$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                                                                                                                  • API String ID: 2830904901-1622806884
                                                                                                                  • Opcode ID: e8797fa57673ca009fe612506f7e0eb5f6828236eb387c2265590f5324755a6b
                                                                                                                  • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                                                                                                                  • Opcode Fuzzy Hash: e8797fa57673ca009fe612506f7e0eb5f6828236eb387c2265590f5324755a6b
                                                                                                                  • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 447 413fd4-41401f call 401faa call 41aa73 call 401faa call 401d64 call 401e8f call 43a5e7 460 414021-414028 Sleep 447->460 461 41402e-41407c call 401f66 call 401d64 call 401fbd call 41afc3 call 404262 call 401d64 call 40b125 447->461 460->461 476 4140f0-41418a call 401f66 call 401d64 call 401fbd call 41afc3 call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 461->476 477 41407e-4140ed call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 461->477 530 41419a-4141a1 476->530 531 41418c-414198 476->531 477->476 532 4141a6-414242 call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 413f9a 530->532 531->532 559 414244-41428a WSAGetLastError call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 532->559 560 41428f-41429d call 4041f1 532->560 583 414b54-414b66 call 4047eb call 4020b4 559->583 566 4142ca-4142df call 404915 call 40428c 560->566 567 41429f-4142c5 call 401f66 * 2 call 41a686 560->567 582 4142e5-414432 call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 4 call 41a96d call 413683 call 4082dc call 440c51 call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 41265d 566->582 566->583 567->583 647 414434-414441 call 40541d 582->647 648 414446-41446d call 401e8f call 412513 582->648 595 414b68-414b88 call 401d64 call 401e8f call 43a5e7 Sleep 583->595 596 414b8e-414b96 call 401d8c 583->596 595->596 596->476 647->648 654 414474-414830 call 403b40 call 40cbf1 call 41adee call 41aec8 call 41ad46 call 401d64 GetTickCount call 41ad46 call 41aca0 call 41ad46 * 2 call 41ac52 call 41aec8 * 5 call 40e679 call 41aec8 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c 648->654 655 41446f-414471 648->655 781 414832 call 404468 654->781 655->654 782 414837-414abb call 401eea * 50 call 401e13 call 401eea * 6 call 401e13 call 4045d5 781->782 900 414ac0-414ac7 782->900 901 414ac9-414ad0 900->901 902 414adb-414ae2 900->902 901->902 903 414ad2-414ad4 901->903 904 414ae4-414ae9 call 40a767 902->904 905 414aee-414b20 call 405415 call 401f66 * 2 call 41a686 902->905 903->902 904->905 916 414b22-414b2e CreateThread 905->916 917 414b34-414b4f call 401eea * 2 call 401e13 905->917 916->917 917->583
                                                                                                                  APIs
                                                                                                                  • Sleep.KERNEL32(00000000,00000029,004742F8,?,00000000), ref: 00414028
                                                                                                                  • WSAGetLastError.WS2_32 ref: 00414249
                                                                                                                  • Sleep.KERNEL32(00000000,00000002), ref: 00414B88
                                                                                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Sleep$ErrorLastLocalTime
                                                                                                                  • String ID: | $%I64u$5.3.0 Pro$@CG$C:\Users\user\Desktop\SC_TR126089907.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$TLS Off$TLS On $XCG$XCG$XCG$`=G$dCG$hlight$name$>G$>G$BG
                                                                                                                  • API String ID: 524882891-2408065321
                                                                                                                  • Opcode ID: dac346f827ee475e75f6dbaddde8e77ce37e6b889d460038b107c94c4f06d8da
                                                                                                                  • Instruction ID: a0bb0b13232d9f5991351636829aab2dda2428bc81dc0b9639db3628de0ead2f
                                                                                                                  • Opcode Fuzzy Hash: dac346f827ee475e75f6dbaddde8e77ce37e6b889d460038b107c94c4f06d8da
                                                                                                                  • Instruction Fuzzy Hash: 58524E31A001145ADB18F771DDA6AEE73A59F90708F1041BFB80A771E2EF385E85CA9D

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  • Sleep.KERNEL32(00001388), ref: 00409E62
                                                                                                                    • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                                    • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                                    • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                                    • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                                                                                                  • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                                                                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                                                                                    • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                                  • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                                                                                                  • API String ID: 3795512280-3163867910
                                                                                                                  • Opcode ID: 25dc6885441413c1cb34c24d28a0f4be4952bc37a9e0bff84388eedc19b5b634
                                                                                                                  • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                                                                                                                  • Opcode Fuzzy Hash: 25dc6885441413c1cb34c24d28a0f4be4952bc37a9e0bff84388eedc19b5b634
                                                                                                                  • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1022 40428c-4042ad connect 1023 4043e1-4043e5 1022->1023 1024 4042b3-4042b6 1022->1024 1027 4043e7-4043f5 WSAGetLastError 1023->1027 1028 40445f 1023->1028 1025 4043da-4043dc 1024->1025 1026 4042bc-4042bf 1024->1026 1029 404461-404465 1025->1029 1030 4042c1-4042e8 call 404cbf call 401f66 call 41a686 1026->1030 1031 4042eb-4042f5 call 420151 1026->1031 1027->1028 1032 4043f7-4043fa 1027->1032 1028->1029 1030->1031 1044 404306-404313 call 420373 1031->1044 1045 4042f7-404301 1031->1045 1034 404439-40443e 1032->1034 1035 4043fc-404437 call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 1032->1035 1037 404443-40445c call 401f66 * 2 call 41a686 1034->1037 1035->1028 1037->1028 1057 404315-404338 call 401f66 * 2 call 41a686 1044->1057 1058 40434c-404357 call 420f34 1044->1058 1045->1037 1084 40433b-404347 call 420191 1057->1084 1069 404389-404396 call 4202ea 1058->1069 1070 404359-404387 call 401f66 * 2 call 41a686 call 420592 1058->1070 1080 404398-4043bb call 401f66 * 2 call 41a686 1069->1080 1081 4043be-4043d7 CreateEventW * 2 1069->1081 1070->1084 1080->1081 1081->1025 1084->1028
                                                                                                                  APIs
                                                                                                                  • connect.WS2_32(?,?,?), ref: 004042A5
                                                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                                                                                  • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                                  • API String ID: 994465650-2151626615
                                                                                                                  • Opcode ID: 2bc5e8461ca3afc75119b91fb400947b0245c98987afaab10fbe88cd63cd31a1
                                                                                                                  • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                                                                                                  • Opcode Fuzzy Hash: 2bc5e8461ca3afc75119b91fb400947b0245c98987afaab10fbe88cd63cd31a1
                                                                                                                  • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  • __Init_thread_footer.LIBCMT ref: 0040A456
                                                                                                                  • Sleep.KERNEL32(000001F4), ref: 0040A461
                                                                                                                  • GetForegroundWindow.USER32 ref: 0040A467
                                                                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                                                                  • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                                                                  • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                                                                    • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                                                  • String ID: [${ User has been idle for $ minutes }$]
                                                                                                                  • API String ID: 911427763-3954389425
                                                                                                                  • Opcode ID: 4f8b8cb0c9ee605f642951e99c9669dc9c444aa7125a2f7fdf95d7018cf2d41d
                                                                                                                  • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                                                                                                  • Opcode Fuzzy Hash: 4f8b8cb0c9ee605f642951e99c9669dc9c444aa7125a2f7fdf95d7018cf2d41d
                                                                                                                  • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1177 40c89e-40c8c3 call 401e52 1180 40c8c9 1177->1180 1181 40c9ed-40ca13 call 401e07 GetLongPathNameW call 403b40 1177->1181 1182 40c8d0-40c8d5 1180->1182 1183 40c9c2-40c9c7 1180->1183 1184 40c905-40c90a 1180->1184 1185 40c9d8 1180->1185 1186 40c9c9-40c9ce call 43ac0f 1180->1186 1187 40c8da-40c8e8 call 41a74b call 401e18 1180->1187 1188 40c8fb-40c900 1180->1188 1189 40c9bb-40c9c0 1180->1189 1190 40c90f-40c916 call 41b15b 1180->1190 1205 40ca18-40ca85 call 403b40 call 40cc37 call 402860 * 2 call 401e13 * 5 1181->1205 1193 40c9dd-40c9e2 call 43ac0f 1182->1193 1183->1193 1184->1193 1185->1193 1197 40c9d3-40c9d6 1186->1197 1209 40c8ed 1187->1209 1188->1193 1189->1193 1206 40c918-40c968 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1190->1206 1207 40c96a-40c9b6 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1190->1207 1202 40c9e3-40c9e8 call 4082d7 1193->1202 1197->1185 1197->1202 1202->1181 1215 40c8f1-40c8f6 call 401e13 1206->1215 1207->1209 1209->1215 1215->1181
                                                                                                                  APIs
                                                                                                                  • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: LongNamePath
                                                                                                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                                  • API String ID: 82841172-425784914
                                                                                                                  • Opcode ID: 32c7dd7da07534816f75e312af4f9c722b84838e0212387709dec4be18cb4e42
                                                                                                                  • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                                                                                                  • Opcode Fuzzy Hash: 32c7dd7da07534816f75e312af4f9c722b84838e0212387709dec4be18cb4e42
                                                                                                                  • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1323 41a51b-41a55a call 401faa call 43a88c InternetOpenW InternetOpenUrlW 1328 41a55c-41a57d InternetReadFile 1323->1328 1329 41a5a3-41a5a6 1328->1329 1330 41a57f-41a59f call 401f86 call 402f08 call 401eea 1328->1330 1331 41a5a8-41a5aa 1329->1331 1332 41a5ac-41a5b9 InternetCloseHandle * 2 call 43a887 1329->1332 1330->1329 1331->1328 1331->1332 1336 41a5be-41a5c8 1332->1336
                                                                                                                  APIs
                                                                                                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                                                                                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                                                                                                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                                                                                                  • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                                                                                                                  • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                                                                                                                  Strings
                                                                                                                  • http://geoplugin.net/json.gp, xrefs: 0041A54E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                                  • String ID: http://geoplugin.net/json.gp
                                                                                                                  • API String ID: 3121278467-91888290
                                                                                                                  • Opcode ID: 36e01e55f813b3e587d73a157094a3d7c5a29764a6c694396ca7ce848afa256e
                                                                                                                  • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                                                                                                  • Opcode Fuzzy Hash: 36e01e55f813b3e587d73a157094a3d7c5a29764a6c694396ca7ce848afa256e
                                                                                                                  • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                                                    • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                                    • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                                    • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                                                  • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseCurrentOpenProcessQueryValue
                                                                                                                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                                  • API String ID: 1866151309-2070987746
                                                                                                                  • Opcode ID: 45f2cc7f8136337c42f5944fd7cecdfc8e179c6ee647a5e14532dc020d3e2dac
                                                                                                                  • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                                                                                                  • Opcode Fuzzy Hash: 45f2cc7f8136337c42f5944fd7cecdfc8e179c6ee647a5e14532dc020d3e2dac
                                                                                                                  • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1365 409d97-409da7 1366 409e44-409e47 1365->1366 1367 409dad-409daf 1365->1367 1368 409db2-409dd8 call 401e07 CreateFileW 1367->1368 1371 409e18 1368->1371 1372 409dda-409de8 GetFileSize 1368->1372 1373 409e1b-409e1f 1371->1373 1374 409dea 1372->1374 1375 409e0f-409e16 CloseHandle 1372->1375 1373->1368 1378 409e21-409e24 1373->1378 1376 409df4-409dfb 1374->1376 1377 409dec-409df2 1374->1377 1375->1373 1379 409e04-409e09 Sleep 1376->1379 1380 409dfd-409dff call 40a7f0 1376->1380 1377->1375 1377->1376 1378->1366 1381 409e26-409e2d 1378->1381 1379->1375 1380->1379 1381->1366 1383 409e2f-409e3f call 4082dc call 4098a5 1381->1383 1383->1366
                                                                                                                  APIs
                                                                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                                  • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CloseCreateHandleSizeSleep
                                                                                                                  • String ID: `AG
                                                                                                                  • API String ID: 1958988193-3058481221
                                                                                                                  • Opcode ID: 0586b8f9d43dbb7048378459902209a7f5a0eee35e296c9d9bb098e6f758afb4
                                                                                                                  • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                                                                                                  • Opcode Fuzzy Hash: 0586b8f9d43dbb7048378459902209a7f5a0eee35e296c9d9bb098e6f758afb4
                                                                                                                  • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1387 4126d2-4126e9 RegCreateKeyA 1388 412722 1387->1388 1389 4126eb-412720 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1387->1389 1391 412724-412730 call 401eea 1388->1391 1389->1391
                                                                                                                  APIs
                                                                                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                                                  • RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                                                  • RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseCreateValue
                                                                                                                  • String ID: HgF$pth_unenc
                                                                                                                  • API String ID: 1818849710-3662775637
                                                                                                                  • Opcode ID: 527e28f3b051cf4da2b25fb1b82031e69a8b63d3ddd468a42223c023ca7a807e
                                                                                                                  • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                                                                                                  • Opcode Fuzzy Hash: 527e28f3b051cf4da2b25fb1b82031e69a8b63d3ddd468a42223c023ca7a807e
                                                                                                                  • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 00409946
                                                                                                                    • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                                    • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateThread$LocalTimewsprintf
                                                                                                                  • String ID: Offline Keylogger Started
                                                                                                                  • API String ID: 465354869-4114347211
                                                                                                                  • Opcode ID: aa7dad158495ae52b0f3a751208c625103e585d813ac465631ead48c5b0ce597
                                                                                                                  • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                                                                                                  • Opcode Fuzzy Hash: aa7dad158495ae52b0f3a751208c625103e585d813ac465631ead48c5b0ce597
                                                                                                                  • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                                                                                                                  APIs
                                                                                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                  • RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseCreateValue
                                                                                                                  • String ID: TUF
                                                                                                                  • API String ID: 1818849710-3431404234
                                                                                                                  • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                                                  • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                                                                                                  • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                                                  • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                                                                                                                  APIs
                                                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                                                                  • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3360349984-0
                                                                                                                  • Opcode ID: f4aaeb2080a592ab8258315a72005a76cc9d26b97f258a459caff36ba9a30bf0
                                                                                                                  • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                                                                                                  • Opcode Fuzzy Hash: f4aaeb2080a592ab8258315a72005a76cc9d26b97f258a459caff36ba9a30bf0
                                                                                                                  • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                                                                                                  APIs
                                                                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0040A009,?,00000000,00000000), ref: 0041B5EB
                                                                                                                  • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A009,?,00000000,00000000), ref: 0041B5FF
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,0040A009,?,00000000,00000000), ref: 0041B60C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CloseCreateHandlePointerWrite
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3604237281-0
                                                                                                                  • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                                                  • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                                                                                                  • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                                                  • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CountEventTick
                                                                                                                  • String ID: >G
                                                                                                                  • API String ID: 180926312-1296849874
                                                                                                                  • Opcode ID: e43420cbb1104f7685dac86efea1cb921a074aae9cf36a541284d59b132dd712
                                                                                                                  • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                                                                                                  • Opcode Fuzzy Hash: e43420cbb1104f7685dac86efea1cb921a074aae9cf36a541284d59b132dd712
                                                                                                                  • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                                                                                                  APIs
                                                                                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                                                                                                  • GetLastError.KERNEL32 ref: 0040BEF1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateErrorLastMutex
                                                                                                                  • String ID: (CG
                                                                                                                  • API String ID: 1925916568-4210230975
                                                                                                                  • Opcode ID: 30c79194240bed052ca1f52dafa43431944ff159ec99ecee2a6806439040bd80
                                                                                                                  • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                                                                                                  • Opcode Fuzzy Hash: 30c79194240bed052ca1f52dafa43431944ff159ec99ecee2a6806439040bd80
                                                                                                                  • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919
                                                                                                                  APIs
                                                                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                                  • RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3677997916-0
                                                                                                                  • Opcode ID: 147e62fc4eb0db3fe2726599cc038d375497f210b40a1d92884617782f01b657
                                                                                                                  • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                                                                                                  • Opcode Fuzzy Hash: 147e62fc4eb0db3fe2726599cc038d375497f210b40a1d92884617782f01b657
                                                                                                                  • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8
                                                                                                                  APIs
                                                                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                  • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                  • RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3677997916-0
                                                                                                                  • Opcode ID: f35e7c15da94557ef338f13a10ac7e5db7717a73998ec4005cb99cacd37e3820
                                                                                                                  • Instruction ID: c18416eb0b1572374c3e2b3be0649ca89fc6f9e16ed4320a44d925c8ae57db2a
                                                                                                                  • Opcode Fuzzy Hash: f35e7c15da94557ef338f13a10ac7e5db7717a73998ec4005cb99cacd37e3820
                                                                                                                  • Instruction Fuzzy Hash: BD018131404229FBDF216FA1DC45DDF7F78EF11754F004065BA04A21A1D7758AB5DBA8
                                                                                                                  APIs
                                                                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                                  • RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3677997916-0
                                                                                                                  • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                                                  • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                                                                                                  • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                                                  • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98
                                                                                                                  APIs
                                                                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                                                                                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                                                                                                                  • RegCloseKey.KERNEL32(?,?,?,0040B996,004660E0), ref: 004124A4
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3677997916-0
                                                                                                                  • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                                                  • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                                                                                                                  • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                                                  • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _wcslen
                                                                                                                  • String ID: xAG
                                                                                                                  • API String ID: 176396367-2759412365
                                                                                                                  • Opcode ID: 5b2808d6a420319a8e352f948dca3b51851caf84ac7e067c3f15d365214f07ca
                                                                                                                  • Instruction ID: 4b5f0267b16b6d1f94f05398eea60063c36f9fdec9e789d07f1c8464d26cb595
                                                                                                                  • Opcode Fuzzy Hash: 5b2808d6a420319a8e352f948dca3b51851caf84ac7e067c3f15d365214f07ca
                                                                                                                  • Instruction Fuzzy Hash: 751193325002049FCB15FF66D8968EF7BA4EF64314B10453FF842622E2EF38A955CB98
                                                                                                                  APIs
                                                                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041A959
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: GlobalMemoryStatus
                                                                                                                  • String ID: @
                                                                                                                  • API String ID: 1890195054-2766056989
                                                                                                                  • Opcode ID: 6a5e85952f382d12afcc854e62baf2dc0b8e461fb7fe04101b075e185c2318ef
                                                                                                                  • Instruction ID: dd145fffdacd7bda74fa2c6e5abe56fe406d4b7e613986be5c07feff288e4f4e
                                                                                                                  • Opcode Fuzzy Hash: 6a5e85952f382d12afcc854e62baf2dc0b8e461fb7fe04101b075e185c2318ef
                                                                                                                  • Instruction Fuzzy Hash: EFD067B99013189FCB20DFA8E945A8DBBF8FB48214F004529E946E3344E774E945CB95
                                                                                                                  APIs
                                                                                                                  • socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                                                    • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateEventStartupsocket
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1953588214-0
                                                                                                                  • Opcode ID: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                                                  • Instruction ID: 6d5c4ce7eefecebe47fda3b025552a79fd8a61a73b62065855ea20d17e135052
                                                                                                                  • Opcode Fuzzy Hash: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                                                  • Instruction Fuzzy Hash: A20171B05087809ED7358F38B8456977FE0AB15314F044DAEF1D697BA1C3B5A481CB18
                                                                                                                  APIs
                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                                                                                                    • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,00434411,?,?,?,?,?,?,?,?,00434411,?,0046D644,0041AD75,?), ref: 00437C37
                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3476068407-0
                                                                                                                  • Opcode ID: a80fbdf5468804761b56489a3a39c56644ed3c61f36a154b7cd34dcf14c41ed8
                                                                                                                  • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                                                                                                                  • Opcode Fuzzy Hash: a80fbdf5468804761b56489a3a39c56644ed3c61f36a154b7cd34dcf14c41ed8
                                                                                                                  • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D
                                                                                                                  APIs
                                                                                                                  • GetForegroundWindow.USER32 ref: 0041AC74
                                                                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041AC87
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$ForegroundText
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 29597999-0
                                                                                                                  • Opcode ID: 1796dd390df28a7f4dbf89d7f01fc1bba1536ee62ee2177b21e7863b89c7f1ab
                                                                                                                  • Instruction ID: 3cf16c2a8257e52241c70e3f2477159e0ff99a2dafdd86ddfb3cfc0a4d760bbd
                                                                                                                  • Opcode Fuzzy Hash: 1796dd390df28a7f4dbf89d7f01fc1bba1536ee62ee2177b21e7863b89c7f1ab
                                                                                                                  • Instruction Fuzzy Hash: 56E04875A0031467EB24A765AC4EFDA766C9704715F0000B9BA19D21C3E9B4EA04CBE4
                                                                                                                  APIs
                                                                                                                  • getaddrinfo.WS2_32(00000000,00000000,00000000,00471B28,00474358,00000000,00414240,00000000,00000001), ref: 00413FBC
                                                                                                                  • WSASetLastError.WS2_32(00000000), ref: 00413FC1
                                                                                                                    • Part of subcall function 00413E37: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                                                    • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                                                    • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                                                                    • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                                                                    • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                                                    • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                                                                    • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                                                                    • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1170566393-0
                                                                                                                  • Opcode ID: de7c912f5844d1f7c2d429620844517faabbfd26de99632591fe9930316e04d8
                                                                                                                  • Instruction ID: 9c65b6197a0e8ce5e429e224625e4c370c9a1848c9e97f9a588a6d75e163472b
                                                                                                                  • Opcode Fuzzy Hash: de7c912f5844d1f7c2d429620844517faabbfd26de99632591fe9930316e04d8
                                                                                                                  • Instruction Fuzzy Hash: 4ED05B326406216FB310575D6D01FFBB5DCDFA67617150077F408D7110D6945D82C3AD
                                                                                                                  APIs
                                                                                                                  • RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AllocateHeap
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1279760036-0
                                                                                                                  • Opcode ID: 382123f4ff15faebfb065adfee4593ee0e25617df91b7722ec70fd9da05ca189
                                                                                                                  • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                                                                                                  • Opcode Fuzzy Hash: 382123f4ff15faebfb065adfee4593ee0e25617df91b7722ec70fd9da05ca189
                                                                                                                  • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                                                                                                  APIs
                                                                                                                  • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Startup
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 724789610-0
                                                                                                                  • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                                                  • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                                                                                                                  • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                                                  • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: send
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2809346765-0
                                                                                                                  • Opcode ID: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                                                                                                                  • Instruction ID: f30177ef1ac25d972003a71432bbdafa3536f6886768dd9ca1b11e7f0a6bf502
                                                                                                                  • Opcode Fuzzy Hash: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                                                                                                                  • Instruction Fuzzy Hash: 4FB09279118302BFCA051B60DC0887A7EBAABC9381B108C2CB146512B0CA37C490EB36
                                                                                                                  APIs
                                                                                                                  • SetEvent.KERNEL32(?,?), ref: 00406F28
                                                                                                                  • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                                                                                                  • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                                                                                                    • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B489
                                                                                                                    • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4BB
                                                                                                                    • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B50C
                                                                                                                    • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B561
                                                                                                                    • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B568
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                                    • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                                    • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                                    • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                    • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,LAL,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000), ref: 0040450E
                                                                                                                    • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000,?,?,?,?,?,00414CE9), ref: 0040453C
                                                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                                                                                                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                                                                                                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                                                                                                  • DeleteFileA.KERNEL32(?), ref: 004078CC
                                                                                                                    • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                                                                                                    • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                                    • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                                  • Sleep.KERNEL32(000007D0), ref: 00407976
                                                                                                                  • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                                                                                                    • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                                                                                                  • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                                                                                                  • API String ID: 2918587301-599666313
                                                                                                                  • Opcode ID: 344c2c21b75ecb46dd144ab5081a25dcbad84b09641d28bfae076c5d202fcd54
                                                                                                                  • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                                                                                                                  • Opcode Fuzzy Hash: 344c2c21b75ecb46dd144ab5081a25dcbad84b09641d28bfae076c5d202fcd54
                                                                                                                  • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                                                                                                                  APIs
                                                                                                                  • __Init_thread_footer.LIBCMT ref: 0040508E
                                                                                                                    • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                                                    • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  • __Init_thread_footer.LIBCMT ref: 004050CB
                                                                                                                  • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                                                                                                                  • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                                                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                                                                                                    • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                                                    • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                                                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                                                                                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                                                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                                                                    • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                                                                                                  • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                                                                                                  • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                                                                  • CloseHandle.KERNEL32 ref: 004053CD
                                                                                                                  • CloseHandle.KERNEL32 ref: 004053D5
                                                                                                                  • CloseHandle.KERNEL32 ref: 004053E7
                                                                                                                  • CloseHandle.KERNEL32 ref: 004053EF
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                                  • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                                                                                                                  • API String ID: 3815868655-81343324
                                                                                                                  • Opcode ID: 5a5e837b1a5c73d244bdc50f52d0c0277f8ea75593c2154cdaf09b4041bb4b09
                                                                                                                  • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                                                                                                  • Opcode Fuzzy Hash: 5a5e837b1a5c73d244bdc50f52d0c0277f8ea75593c2154cdaf09b4041bb4b09
                                                                                                                  • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                                                                                                  APIs
                                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                                                                                                    • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                    • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                    • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                                                                                                    • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                                    • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                                    • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                                                                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                                                                                  • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                                                                                                                  • API String ID: 65172268-860466531
                                                                                                                  • Opcode ID: a717337548b7bc67ef5be46030ec01eef617e46586cf903e586267f0ffb0d611
                                                                                                                  • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                                                                                                                  • Opcode Fuzzy Hash: a717337548b7bc67ef5be46030ec01eef617e46586cf903e586267f0ffb0d611
                                                                                                                  • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                                                                                                                  APIs
                                                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Find$CloseFile$FirstNext
                                                                                                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                                  • API String ID: 1164774033-3681987949
                                                                                                                  • Opcode ID: 76fc6f2f8938e12f39c523e25d48290a13894f358b4903df99732470634f51ee
                                                                                                                  • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                                                                                                  • Opcode Fuzzy Hash: 76fc6f2f8938e12f39c523e25d48290a13894f358b4903df99732470634f51ee
                                                                                                                  • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                                                                                                  APIs
                                                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                                                                  • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Find$Close$File$FirstNext
                                                                                                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                                  • API String ID: 3527384056-432212279
                                                                                                                  • Opcode ID: ca4c0e5d84f7cb7ee38c8e3133793af3c270269af9d1d2af5c27a16806cbf6ef
                                                                                                                  • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                                                                                                  • Opcode Fuzzy Hash: ca4c0e5d84f7cb7ee38c8e3133793af3c270269af9d1d2af5c27a16806cbf6ef
                                                                                                                  • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                                                                                                  APIs
                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                                                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                                                                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                                                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                                                                                                    • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                    • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                    • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                                                                  • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                                                                                                  • API String ID: 726551946-3025026198
                                                                                                                  • Opcode ID: fc54411cfe1b16664af1a362ddb9d5f33de03dcc47f8e28b32825c15ab13c746
                                                                                                                  • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                                                                                                  • Opcode Fuzzy Hash: fc54411cfe1b16664af1a362ddb9d5f33de03dcc47f8e28b32825c15ab13c746
                                                                                                                  • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                                                                                                  APIs
                                                                                                                  • OpenClipboard.USER32 ref: 004159C7
                                                                                                                  • EmptyClipboard.USER32 ref: 004159D5
                                                                                                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                                                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                                                                                                  • CloseClipboard.USER32 ref: 00415A5A
                                                                                                                  • OpenClipboard.USER32 ref: 00415A61
                                                                                                                  • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                                                  • CloseClipboard.USER32 ref: 00415A89
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3520204547-0
                                                                                                                  • Opcode ID: 92ff16621bb008ec349cac96769bc2e22541bc6f21a77906abd6e904815f1c10
                                                                                                                  • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                                                                                                                  • Opcode Fuzzy Hash: 92ff16621bb008ec349cac96769bc2e22541bc6f21a77906abd6e904815f1c10
                                                                                                                  • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 0$1$2$3$4$5$6$7
                                                                                                                  • API String ID: 0-3177665633
                                                                                                                  • Opcode ID: ecb5ab5c14ee3ab28359405d5e5b6cf7107a78e006011c639a5add2d2d09b49f
                                                                                                                  • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                                                                                                  • Opcode Fuzzy Hash: ecb5ab5c14ee3ab28359405d5e5b6cf7107a78e006011c639a5add2d2d09b49f
                                                                                                                  • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                                                                                                  APIs
                                                                                                                  • GetForegroundWindow.USER32(?,?,004740F8), ref: 00409B3F
                                                                                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                                  • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                                  • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                                  • GetKeyboardState.USER32(?,?,004740F8), ref: 00409B67
                                                                                                                  • ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                                  • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                                  • ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                                  • String ID: 8[G
                                                                                                                  • API String ID: 1888522110-1691237782
                                                                                                                  • Opcode ID: 925a5eb4e75251b1def6021025d6fe2bb9c2de734200d7c4e5adce8016dcfecb
                                                                                                                  • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                                                                                                  • Opcode Fuzzy Hash: 925a5eb4e75251b1def6021025d6fe2bb9c2de734200d7c4e5adce8016dcfecb
                                                                                                                  • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                                                                                                  APIs
                                                                                                                  • _wcslen.LIBCMT ref: 00406788
                                                                                                                  • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Object_wcslen
                                                                                                                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                                  • API String ID: 240030777-3166923314
                                                                                                                  • Opcode ID: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                                                                                  • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                                                                                                  • Opcode Fuzzy Hash: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                                                                                  • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                                                                                                  APIs
                                                                                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                                                                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                                                                                                  • GetLastError.KERNEL32 ref: 00419935
                                                                                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3587775597-0
                                                                                                                  • Opcode ID: 7cf647704d9da6e3b27b6f932af26f9fb806ddb2be27768a2356daea2e115d5b
                                                                                                                  • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                                                                                                  • Opcode Fuzzy Hash: 7cf647704d9da6e3b27b6f932af26f9fb806ddb2be27768a2356daea2e115d5b
                                                                                                                  • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                                                                                                  APIs
                                                                                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B489
                                                                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4BB
                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B529
                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B536
                                                                                                                    • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B50C
                                                                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B561
                                                                                                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B568
                                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,004742E0,004742F8), ref: 0041B570
                                                                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B583
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2341273852-0
                                                                                                                  • Opcode ID: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                                                                                  • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                                                                                                  • Opcode Fuzzy Hash: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                                                                                  • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                                                                                                  APIs
                                                                                                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                                                                                                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                                                                                                    • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$Find$CreateFirstNext
                                                                                                                  • String ID: @CG$XCG$`HG$`HG$>G
                                                                                                                  • API String ID: 341183262-3780268858
                                                                                                                  • Opcode ID: 1d006b57ec8407d67f410f90ba5cffff3744a2d4bd6339dc38e1b966420dba2d
                                                                                                                  • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                                                                                                                  • Opcode Fuzzy Hash: 1d006b57ec8407d67f410f90ba5cffff3744a2d4bd6339dc38e1b966420dba2d
                                                                                                                  • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                                                                                                                  APIs
                                                                                                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                                                  • API String ID: 2127411465-314212984
                                                                                                                  • Opcode ID: 6a6134eaba03f115680d8d2eb42cf80636db46aabc3f1259ea9bdfec89823a6a
                                                                                                                  • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                                                                                                                  • Opcode Fuzzy Hash: 6a6134eaba03f115680d8d2eb42cf80636db46aabc3f1259ea9bdfec89823a6a
                                                                                                                  • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                                                                                                  APIs
                                                                                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                                                                                  • GetLastError.KERNEL32 ref: 0040B261
                                                                                                                  Strings
                                                                                                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                                                                                  • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                                                                                  • UserProfile, xrefs: 0040B227
                                                                                                                  • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: DeleteErrorFileLast
                                                                                                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                                  • API String ID: 2018770650-1062637481
                                                                                                                  • Opcode ID: a2128c42762ca10650babd8ab1cfb8cacd5f3b7577b82760db2916a4dab099ee
                                                                                                                  • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                                                                                                                  • Opcode Fuzzy Hash: a2128c42762ca10650babd8ab1cfb8cacd5f3b7577b82760db2916a4dab099ee
                                                                                                                  • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                                                                                                                  APIs
                                                                                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                                                  • GetLastError.KERNEL32 ref: 00416B02
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                                  • String ID: SeShutdownPrivilege
                                                                                                                  • API String ID: 3534403312-3733053543
                                                                                                                  • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                                                  • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                                                                                                  • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                                                  • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                                                                                                  APIs
                                                                                                                  • __EH_prolog.LIBCMT ref: 004089AE
                                                                                                                    • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                                                    • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                                                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                                                                                    • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,LAL,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000), ref: 0040450E
                                                                                                                    • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000,?,?,?,?,?,00414CE9), ref: 0040453C
                                                                                                                    • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                                                    • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                                    • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4043647387-0
                                                                                                                  • Opcode ID: e6d26fc3e43131747f23564c7bb6c2c23fda576562a32a53d96f0f7b65159877
                                                                                                                  • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                                                                                                                  • Opcode Fuzzy Hash: e6d26fc3e43131747f23564c7bb6c2c23fda576562a32a53d96f0f7b65159877
                                                                                                                  • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                                                                                                                  APIs
                                                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                                                                                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 276877138-0
                                                                                                                  • Opcode ID: b329c8b03f607fc556bfe747d7dfe709dacdcffe937466b951116c7124fc47ce
                                                                                                                  • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                                                                                                  • Opcode Fuzzy Hash: b329c8b03f607fc556bfe747d7dfe709dacdcffe937466b951116c7124fc47ce
                                                                                                                  • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                                                    • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                                                    • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                                                    • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                                                    • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                                                                                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                                                                                                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                                  • String ID: PowrProf.dll$SetSuspendState
                                                                                                                  • API String ID: 1589313981-1420736420
                                                                                                                  • Opcode ID: 7adedae087191cdbb87074b96bc09b469b6d5cbd4a3edd008392af3fdf127515
                                                                                                                  • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                                                                                                                  • Opcode Fuzzy Hash: 7adedae087191cdbb87074b96bc09b469b6d5cbd4a3edd008392af3fdf127515
                                                                                                                  • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                                                                                                                  APIs
                                                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0045127C
                                                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004512A5
                                                                                                                  • GetACP.KERNEL32 ref: 004512BA
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: InfoLocale
                                                                                                                  • String ID: ACP$OCP
                                                                                                                  • API String ID: 2299586839-711371036
                                                                                                                  • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                                                  • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                                                                                                  • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                                                  • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                                                                                                  APIs
                                                                                                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                                                                                                                  • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                                                                                                  • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                                                                                                  • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                                                                  • String ID: SETTINGS
                                                                                                                  • API String ID: 3473537107-594951305
                                                                                                                  • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                                                  • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                                                                                                  • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                                                  • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                                                                  • GetUserDefaultLCID.KERNEL32 ref: 004514C3
                                                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00451594
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 745075371-0
                                                                                                                  • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                                                  • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                                                                                                  • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                                                  • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                                                                                                  APIs
                                                                                                                  • __EH_prolog.LIBCMT ref: 00407A91
                                                                                                                  • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Find$File$CloseFirstH_prologNext
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1157919129-0
                                                                                                                  • Opcode ID: 6a2d412744edee45f0d860d0441e360fba5e5849462073823f699ecb6cc56ff2
                                                                                                                  • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                                                                                                  • Opcode Fuzzy Hash: 6a2d412744edee45f0d860d0441e360fba5e5849462073823f699ecb6cc56ff2
                                                                                                                  • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                                                                                                  APIs
                                                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                                                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: DownloadExecuteFileShell
                                                                                                                  • String ID: C:\Users\user\Desktop\SC_TR126089907.exe$open
                                                                                                                  • API String ID: 2825088817-345052940
                                                                                                                  • Opcode ID: 987d970d9b7ebc5844ce0f49172f527790acb3a99b69c5f6248a1dc45aa8f3ed
                                                                                                                  • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                                                                                                                  • Opcode Fuzzy Hash: 987d970d9b7ebc5844ce0f49172f527790acb3a99b69c5f6248a1dc45aa8f3ed
                                                                                                                  • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                                                                                                                  APIs
                                                                                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: FileFind$FirstNextsend
                                                                                                                  • String ID: x@G$x@G
                                                                                                                  • API String ID: 4113138495-3390264752
                                                                                                                  • Opcode ID: 9e42d4624aa1081e31404d699729e015607263420c2313147d1fc57e1445648b
                                                                                                                  • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                                                                                                  • Opcode Fuzzy Hash: 9e42d4624aa1081e31404d699729e015607263420c2313147d1fc57e1445648b
                                                                                                                  • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                                                                                                  APIs
                                                                                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                                                    • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                                                    • Part of subcall function 004126D2: RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                                                    • Part of subcall function 004126D2: RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                                                                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                                  • API String ID: 4127273184-3576401099
                                                                                                                  • Opcode ID: f4ba7aec24a953ef4b92a26ea97f229a08492362b077529f009aa708e5b31fc0
                                                                                                                  • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                                                                                                  • Opcode Fuzzy Hash: f4ba7aec24a953ef4b92a26ea97f229a08492362b077529f009aa708e5b31fc0
                                                                                                                  • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                                                                                                  APIs
                                                                                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                                                    • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                                                    • Part of subcall function 004126D2: RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                                                    • Part of subcall function 004126D2: RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                                                                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                                  • API String ID: 4127273184-3576401099
                                                                                                                  • Opcode ID: 3cca19850bf31f4f0fb7f64d74422f26e2d0d512dadd11c93372ceda303b45d5
                                                                                                                  • Instruction ID: f2617a255fd7246e173cf48333a5ec3092ca3a632a8680fa2b2f8bd5747a896b
                                                                                                                  • Opcode Fuzzy Hash: 3cca19850bf31f4f0fb7f64d74422f26e2d0d512dadd11c93372ceda303b45d5
                                                                                                                  • Instruction Fuzzy Hash: 9EF0623278011422D529357A8E2FBEE1801D796B20F65402FF202A57D6FB8E46D142DE
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 00450B61
                                                                                                                  • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                                                                                                  • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00450CA2
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4212172061-0
                                                                                                                  • Opcode ID: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                                                                                                  • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                                                                                                  • Opcode Fuzzy Hash: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                                                                                                  • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                                                                                                  APIs
                                                                                                                  • __EH_prolog.LIBCMT ref: 00408DAC
                                                                                                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: FileFind$FirstH_prologNext
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 301083792-0
                                                                                                                  • Opcode ID: 0b43960f9993051d9431381d87604967d53f88331668a9e606d8c6ddd84d18a2
                                                                                                                  • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                                                                                                                  • Opcode Fuzzy Hash: 0b43960f9993051d9431381d87604967d53f88331668a9e606d8c6ddd84d18a2
                                                                                                                  • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                                                                                                                  APIs
                                                                                                                  • _free.LIBCMT ref: 00448067
                                                                                                                    • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                                                  • GetTimeZoneInformation.KERNEL32 ref: 00448079
                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,0047179C,000000FF,?,0000003F,?,?), ref: 004480F1
                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,004717F0,000000FF,?,0000003F,?,?,?,0047179C,000000FF,?,0000003F,?,?), ref: 0044811E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 806657224-0
                                                                                                                  • Opcode ID: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                                                                                                  • Instruction ID: ab6739d36243922ba69d1bbe12a1b6ae93f84769bc63f42ae41568d8b76a7737
                                                                                                                  • Opcode Fuzzy Hash: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                                                                                                  • Instruction Fuzzy Hash: 8731DA70904205DFEB149F68CC8186EBBF8FF05760B2442AFE054AB2A1DB349A42DB18
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2829624132-0
                                                                                                                  • Opcode ID: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                                                                                                                  • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                                                                                                                  • Opcode Fuzzy Hash: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                                                                                                                  • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                                                                                                                  APIs
                                                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 0043A755
                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 0043A75F
                                                                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 0043A76C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3906539128-0
                                                                                                                  • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                                                  • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                                                                                                  • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                                                  • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                                                                                                  APIs
                                                                                                                  • GetCurrentProcess.KERNEL32(?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 00442575
                                                                                                                  • TerminateProcess.KERNEL32(00000000,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 0044257C
                                                                                                                  • ExitProcess.KERNEL32 ref: 0044258E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1703294689-0
                                                                                                                  • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                                                  • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                                                                                                  • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                                                  • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88
                                                                                                                  APIs
                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: InfoLocale
                                                                                                                  • String ID: GetLocaleInfoEx
                                                                                                                  • API String ID: 2299586839-2904428671
                                                                                                                  • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                                                  • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                                                                                                  • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                                                  • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1663032902-0
                                                                                                                  • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                                                  • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                                                                                                  • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                                                  • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                  • EnumSystemLocalesW.KERNEL32(00450E6A,00000001), ref: 00450DB4
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1084509184-0
                                                                                                                  • Opcode ID: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                                                                                                                  • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                                                                                                                  • Opcode Fuzzy Hash: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                                                                                                                  • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2692324296-0
                                                                                                                  • Opcode ID: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                                                                                                  • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                                                                                                  • Opcode Fuzzy Hash: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                                                                                                  • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                  • EnumSystemLocalesW.KERNEL32(004510BA,00000001), ref: 00450E29
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1084509184-0
                                                                                                                  • Opcode ID: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                                                                                                                  • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                                                                                                                  • Opcode Fuzzy Hash: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                                                                                                                  • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(-00471558,?,0044225B,00000000,0046DAC0,0000000C,00442216,0000000A,?,?,00448739,0000000A,?,00446F74,00000001,00000364), ref: 00444ADB
                                                                                                                  • EnumSystemLocalesW.KERNEL32(Function_00047068,00000001,0046DC48,0000000C), ref: 004470E6
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1272433827-0
                                                                                                                  • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                                                                  • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                                                                                                  • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                                                                  • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                  • EnumSystemLocalesW.KERNEL32(00450C4E,00000001), ref: 00450D2E
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1084509184-0
                                                                                                                  • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                                                                  • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                                                                                                                  • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                                                                  • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                                                                                                                  APIs
                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3192549508-0
                                                                                                                  • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                                                                  • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                                                                                                                  • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: HeapProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 54951025-0
                                                                                                                  • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                                                                  • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                                                                                                  • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                                                                  • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                                                                                                  APIs
                                                                                                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                                                                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                                                                                                    • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                                                                                                                  • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                                                                                                                  • DeleteDC.GDI32(?), ref: 0041805D
                                                                                                                  • DeleteDC.GDI32(00000000), ref: 00418060
                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                                                                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                                                                                                                  • GetIconInfo.USER32(?,?), ref: 004180CB
                                                                                                                  • DeleteObject.GDI32(?), ref: 004180FA
                                                                                                                  • DeleteObject.GDI32(?), ref: 00418107
                                                                                                                  • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                                                                                                                  • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                                                                                                                  • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                                                                                                                  • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                                                                                                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                                                                                                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                                                                                                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                                                                                                                  • DeleteDC.GDI32(?), ref: 0041827F
                                                                                                                  • DeleteDC.GDI32(00000000), ref: 00418282
                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00418285
                                                                                                                  • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00418344
                                                                                                                  • GlobalFree.KERNEL32(?), ref: 0041834B
                                                                                                                  • DeleteDC.GDI32(?), ref: 0041835B
                                                                                                                  • DeleteDC.GDI32(00000000), ref: 00418366
                                                                                                                  • DeleteDC.GDI32(?), ref: 00418398
                                                                                                                  • DeleteDC.GDI32(00000000), ref: 0041839B
                                                                                                                  • DeleteObject.GDI32(?), ref: 004183A1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                                                                                                                  • String ID: DISPLAY
                                                                                                                  • API String ID: 1765752176-865373369
                                                                                                                  • Opcode ID: 54e54478d3a93c6a48e505b633be5783707cf85144324253bebfee7b4c7dea2f
                                                                                                                  • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                                                                                                                  • Opcode Fuzzy Hash: 54e54478d3a93c6a48e505b633be5783707cf85144324253bebfee7b4c7dea2f
                                                                                                                  • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                                                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                                                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                                                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                                                                                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                                                                                                  • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                                                                                                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                                                                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                                                                                                  • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                                                                                                  • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                                                                                                  • ResumeThread.KERNEL32(?), ref: 00417582
                                                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                                                                                                  • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                                                                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                                                                                                  • GetLastError.KERNEL32 ref: 004175C7
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                                                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                                                  • API String ID: 4188446516-3035715614
                                                                                                                  • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                                                                  • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                                                                                                  • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                                                                  • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                                                                                                                  APIs
                                                                                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                                                                                                  • ExitProcess.KERNEL32 ref: 0041151D
                                                                                                                    • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                    • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                    • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                    • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                                                                                                  • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                                                                                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                                                                                                    • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                    • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                    • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                  • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                                                                                                  • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                                                                                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                                                                                                  • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                                                                                                    • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0040A009,?,00000000,00000000), ref: 0041B5EB
                                                                                                                    • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A009,?,00000000,00000000), ref: 0041B5FF
                                                                                                                    • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000,?,0040A009,?,00000000,00000000), ref: 0041B60C
                                                                                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                                                                                                  • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                                                                                                  • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                                                                                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                                                                                                    • Part of subcall function 0041B58F: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                                                                                  • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                                                                                                  • API String ID: 4250697656-2665858469
                                                                                                                  • Opcode ID: c80fabc7b58b6664533cdc435cbe53a9781b5ca893f5b0e43887563f66929a29
                                                                                                                  • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                                                                                                  • Opcode Fuzzy Hash: c80fabc7b58b6664533cdc435cbe53a9781b5ca893f5b0e43887563f66929a29
                                                                                                                  • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                    • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                                                                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                                                                                                    • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                                    • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                                    • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                                    • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                                                                                                  • ExitProcess.KERNEL32 ref: 0040C287
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                  • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                                                                  • API String ID: 3797177996-1998216422
                                                                                                                  • Opcode ID: f8db6c80a5998e80f5fcda658f3bc18fad5a3966bea32a5fb824f2fdbbebcd5a
                                                                                                                  • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                                                                                                                  • Opcode Fuzzy Hash: f8db6c80a5998e80f5fcda658f3bc18fad5a3966bea32a5fb824f2fdbbebcd5a
                                                                                                                  • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                                                                                                                  APIs
                                                                                                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                                                                                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                                                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                                                                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                                                                                                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                                                                                                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                                                                                                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                                                                                                                  • SetEvent.KERNEL32 ref: 0041A38A
                                                                                                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                                                                                                  • CloseHandle.KERNEL32 ref: 0041A3AB
                                                                                                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                                                                                                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                                                                                                  • API String ID: 738084811-1408154895
                                                                                                                  • Opcode ID: 488289ec40dba372481858aeedb64a88910d805c9ae5a4b7c21143b04d603b6e
                                                                                                                  • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                                                                                                  • Opcode Fuzzy Hash: 488289ec40dba372481858aeedb64a88910d805c9ae5a4b7c21143b04d603b6e
                                                                                                                  • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                                                                                                  APIs
                                                                                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                                                                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                                                                                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                                                                                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                                                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                                                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                                                                                  • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                                                                                                  • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                                                                                                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                                                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                                                                                  • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                                                                                                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                                                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$Write$Create
                                                                                                                  • String ID: RIFF$WAVE$data$fmt
                                                                                                                  • API String ID: 1602526932-4212202414
                                                                                                                  • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                                                  • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                                                                                                  • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                                                  • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\SC_TR126089907.exe,00000001,004068B2,C:\Users\user\Desktop\SC_TR126089907.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressHandleModuleProc
                                                                                                                  • String ID: C:\Users\user\Desktop\SC_TR126089907.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                                  • API String ID: 1646373207-1488032835
                                                                                                                  • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                                                  • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                                                                                                  • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                                                  • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                                                                                                  APIs
                                                                                                                  • _wcslen.LIBCMT ref: 0040BC75
                                                                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                                                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\SC_TR126089907.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                                                                                  • _wcslen.LIBCMT ref: 0040BD54
                                                                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\SC_TR126089907.exe,00000000,00000000), ref: 0040BDF2
                                                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                                                                                  • _wcslen.LIBCMT ref: 0040BE34
                                                                                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                                                                                                  • ExitProcess.KERNEL32 ref: 0040BED0
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                                  • String ID: 6$C:\Users\user\Desktop\SC_TR126089907.exe$del$open$BG$BG
                                                                                                                  • API String ID: 1579085052-1076855639
                                                                                                                  • Opcode ID: 5810891c7d77c7b93cc386c5bda24951b24e135575458cac5ec9797dffa7e349
                                                                                                                  • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                                                                                                  • Opcode Fuzzy Hash: 5810891c7d77c7b93cc386c5bda24951b24e135575458cac5ec9797dffa7e349
                                                                                                                  • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                                                                                                                  APIs
                                                                                                                  • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                                                                                                  • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                                                                                                                  • lstrlenW.KERNEL32(?), ref: 0041B207
                                                                                                                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                                                                                                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                                                                                                  • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                                                                                                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                                                                                                  • _wcslen.LIBCMT ref: 0041B2DB
                                                                                                                  • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                                                                                                  • GetLastError.KERNEL32 ref: 0041B313
                                                                                                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                                                                                                  • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                                                                                                  • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                                                                                                  • GetLastError.KERNEL32 ref: 0041B370
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                                  • String ID: ?
                                                                                                                  • API String ID: 3941738427-1684325040
                                                                                                                  • Opcode ID: 17f0383a2199e65fad79c02efdfd6f833a281a6f5bd6be27e9a359bd3f4b92bf
                                                                                                                  • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                                                                                                  • Opcode Fuzzy Hash: 17f0383a2199e65fad79c02efdfd6f833a281a6f5bd6be27e9a359bd3f4b92bf
                                                                                                                  • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free$EnvironmentVariable$_wcschr
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3899193279-0
                                                                                                                  • Opcode ID: 4dff80f9f2e6418a47ef4f1e3ec22160d27dda194db1b92759e52112f0dcc884
                                                                                                                  • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                                                                                                  • Opcode Fuzzy Hash: 4dff80f9f2e6418a47ef4f1e3ec22160d27dda194db1b92759e52112f0dcc884
                                                                                                                  • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                                                                                                  APIs
                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                                                                                                    • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                                                    • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                                                    • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                                                  • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                                                                                                  • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                                                                                                  • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                                                                                                  • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                                                                                                  • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                                                                                                  • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                                                                                                  • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                                                                                                  • Sleep.KERNEL32(00000064), ref: 00412060
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                                                  • String ID: /stext "$HDG$HDG$>G$>G
                                                                                                                  • API String ID: 1223786279-3931108886
                                                                                                                  • Opcode ID: 951e407a7335b9e0a56f91841e3e4d0ffd1770d323d9a5522bd6a3f544b0dece
                                                                                                                  • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                                                                                                                  • Opcode Fuzzy Hash: 951e407a7335b9e0a56f91841e3e4d0ffd1770d323d9a5522bd6a3f544b0dece
                                                                                                                  • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                                                                                                                  APIs
                                                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                                                  • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                                                                  • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                                                  • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                                                  • API String ID: 2490988753-744132762
                                                                                                                  • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                                                                                  • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                                                                                                                  • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                                                                                  • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                                                                                                                  APIs
                                                                                                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                                                                                                                  • GetCursorPos.USER32(?), ref: 0041CAF8
                                                                                                                  • SetForegroundWindow.USER32(?), ref: 0041CB01
                                                                                                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                                                                                                  • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                                                                                                                  • ExitProcess.KERNEL32 ref: 0041CB74
                                                                                                                  • CreatePopupMenu.USER32 ref: 0041CB7A
                                                                                                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                                  • String ID: Close
                                                                                                                  • API String ID: 1657328048-3535843008
                                                                                                                  • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                                                  • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                                                                                                  • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                                                  • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free$Info
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2509303402-0
                                                                                                                  • Opcode ID: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                                                                                                                  • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                                                                                                                  • Opcode Fuzzy Hash: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                                                                                                                  • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                                                                                                                  APIs
                                                                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                                                                                                  • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                                                                                  • __aulldiv.LIBCMT ref: 00407FE9
                                                                                                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                                                                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                                                                                  • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                                                                                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                                                                                                  • API String ID: 1884690901-3066803209
                                                                                                                  • Opcode ID: 88ea97f44c53fbd348cf9e53321a401212c3e6164c9f36926d15b5b173278924
                                                                                                                  • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                                                                                                                  • Opcode Fuzzy Hash: 88ea97f44c53fbd348cf9e53321a401212c3e6164c9f36926d15b5b173278924
                                                                                                                  • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                                                                                                                  APIs
                                                                                                                  • ___free_lconv_mon.LIBCMT ref: 004500B1
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                                                                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                                                                                                  • _free.LIBCMT ref: 004500A6
                                                                                                                    • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                                                  • _free.LIBCMT ref: 004500C8
                                                                                                                  • _free.LIBCMT ref: 004500DD
                                                                                                                  • _free.LIBCMT ref: 004500E8
                                                                                                                  • _free.LIBCMT ref: 0045010A
                                                                                                                  • _free.LIBCMT ref: 0045011D
                                                                                                                  • _free.LIBCMT ref: 0045012B
                                                                                                                  • _free.LIBCMT ref: 00450136
                                                                                                                  • _free.LIBCMT ref: 0045016E
                                                                                                                  • _free.LIBCMT ref: 00450175
                                                                                                                  • _free.LIBCMT ref: 00450192
                                                                                                                  • _free.LIBCMT ref: 004501AA
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 161543041-0
                                                                                                                  • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                                                  • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                                                                                                  • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                                                  • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                                                                                                  APIs
                                                                                                                  • __EH_prolog.LIBCMT ref: 0041912D
                                                                                                                  • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                                                                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                                                                                                  • Sleep.KERNEL32(000003E8), ref: 0041926D
                                                                                                                  • GetLocalTime.KERNEL32(?), ref: 0041927C
                                                                                                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                                  • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                                                                  • API String ID: 489098229-65789007
                                                                                                                  • Opcode ID: 44793622330fde52a2f30c6cdcdb0a3b072200039cd4f36984e96f4569c3285d
                                                                                                                  • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                                                                                                  • Opcode Fuzzy Hash: 44793622330fde52a2f30c6cdcdb0a3b072200039cd4f36984e96f4569c3285d
                                                                                                                  • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                    • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                    • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                    • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                    • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                                                                                                  • ExitProcess.KERNEL32 ref: 0040C832
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                                  • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                                                  • API String ID: 1913171305-390638927
                                                                                                                  • Opcode ID: 55bb4ee7066f8aebb67eba3c7e5c5b5a3aff5d198cab0c6ae93ac72ca68ce97f
                                                                                                                  • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                                                                                                  • Opcode Fuzzy Hash: 55bb4ee7066f8aebb67eba3c7e5c5b5a3aff5d198cab0c6ae93ac72ca68ce97f
                                                                                                                  • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 269201875-0
                                                                                                                  • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                                                                  • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                                                                                                                  • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                                                                  • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                                                                                                                  APIs
                                                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                                  • closesocket.WS2_32(000000FF), ref: 0040481F
                                                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404856
                                                                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404867
                                                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040486E
                                                                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404880
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404885
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040488A
                                                                                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404895
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 0040489A
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3658366068-0
                                                                                                                  • Opcode ID: c0811b9552baa960996580efd3a95ddbe219791cb6e29288b5199f5b52bda897
                                                                                                                  • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                                                                                                  • Opcode Fuzzy Hash: c0811b9552baa960996580efd3a95ddbe219791cb6e29288b5199f5b52bda897
                                                                                                                  • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                                                                                                                  • GetLastError.KERNEL32 ref: 00454A96
                                                                                                                  • __dosmaperr.LIBCMT ref: 00454A9D
                                                                                                                  • GetFileType.KERNEL32(00000000), ref: 00454AA9
                                                                                                                  • GetLastError.KERNEL32 ref: 00454AB3
                                                                                                                  • __dosmaperr.LIBCMT ref: 00454ABC
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00454C26
                                                                                                                  • GetLastError.KERNEL32 ref: 00454C58
                                                                                                                  • __dosmaperr.LIBCMT ref: 00454C5F
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                  • String ID: H
                                                                                                                  • API String ID: 4237864984-2852464175
                                                                                                                  • Opcode ID: 43154248a50fd66e96ac6d70bada307b7577a7ac671062952f04f408382b00d8
                                                                                                                  • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                                                                                                                  • Opcode Fuzzy Hash: 43154248a50fd66e96ac6d70bada307b7577a7ac671062952f04f408382b00d8
                                                                                                                  • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: 65535$udp
                                                                                                                  • API String ID: 0-1267037602
                                                                                                                  • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                                                                  • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                                                                                                  • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                                                                  • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                                                                                                  APIs
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                                                                                                                  • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                                                                                                                  • __dosmaperr.LIBCMT ref: 004393CD
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                                                                                                                  • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                                                                                                                  • __dosmaperr.LIBCMT ref: 0043940A
                                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                                                                                                                  • __dosmaperr.LIBCMT ref: 0043945E
                                                                                                                  • _free.LIBCMT ref: 0043946A
                                                                                                                  • _free.LIBCMT ref: 00439471
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2441525078-0
                                                                                                                  • Opcode ID: 684e6fef7141b114c3b5ff973dde56bcea396d28ee1fdac90182f4155713f89e
                                                                                                                  • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                                                                                                                  • Opcode Fuzzy Hash: 684e6fef7141b114c3b5ff973dde56bcea396d28ee1fdac90182f4155713f89e
                                                                                                                  • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                                                                                                                  APIs
                                                                                                                  • SetEvent.KERNEL32(?,?), ref: 00404E71
                                                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                                                                  • TranslateMessage.USER32(?), ref: 00404F30
                                                                                                                  • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                                                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                                                                                                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                                  • API String ID: 2956720200-749203953
                                                                                                                  • Opcode ID: d95b725b73043253d910ff3d91bf1cb07a4818691f21f3f92f09bd026dddf236
                                                                                                                  • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                                                                                                                  • Opcode Fuzzy Hash: d95b725b73043253d910ff3d91bf1cb07a4818691f21f3f92f09bd026dddf236
                                                                                                                  • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                                                                                                                  APIs
                                                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                                                                                                  • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                                                                                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                                                                  • String ID: <$@$@FG$@FG$Temp
                                                                                                                  • API String ID: 1107811701-2245803885
                                                                                                                  • Opcode ID: d3d63833d8ab8f1d961b4a1da5279e22cff83bf31b029fb53a98ed145dc2fc76
                                                                                                                  • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                                                                                                                  • Opcode Fuzzy Hash: d3d63833d8ab8f1d961b4a1da5279e22cff83bf31b029fb53a98ed145dc2fc76
                                                                                                                  • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                                                                                                  APIs
                                                                                                                  • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                                                                                                  • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\Desktop\SC_TR126089907.exe), ref: 00406705
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CurrentProcess
                                                                                                                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                                                                                                                  • API String ID: 2050909247-4145329354
                                                                                                                  • Opcode ID: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                                                                                                  • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                                                                                                                  • Opcode Fuzzy Hash: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                                                                                                  • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                                                                                                                  APIs
                                                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                                                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                                                                                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 221034970-0
                                                                                                                  • Opcode ID: fa1b8ca369088c977c56d8324615d0cdc0d6a29edab9bcf25d2a1dd6b7673671
                                                                                                                  • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                                                                                                                  • Opcode Fuzzy Hash: fa1b8ca369088c977c56d8324615d0cdc0d6a29edab9bcf25d2a1dd6b7673671
                                                                                                                  • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                                                                                                                  APIs
                                                                                                                  • _free.LIBCMT ref: 00446DDF
                                                                                                                    • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                                                  • _free.LIBCMT ref: 00446DEB
                                                                                                                  • _free.LIBCMT ref: 00446DF6
                                                                                                                  • _free.LIBCMT ref: 00446E01
                                                                                                                  • _free.LIBCMT ref: 00446E0C
                                                                                                                  • _free.LIBCMT ref: 00446E17
                                                                                                                  • _free.LIBCMT ref: 00446E22
                                                                                                                  • _free.LIBCMT ref: 00446E2D
                                                                                                                  • _free.LIBCMT ref: 00446E38
                                                                                                                  • _free.LIBCMT ref: 00446E46
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 776569668-0
                                                                                                                  • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                                                  • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                                                                                                                  • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                                                  • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Eventinet_ntoa
                                                                                                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                                                                                                  • API String ID: 3578746661-4192532303
                                                                                                                  • Opcode ID: 82bd679fba3198f42106cba0c187218fd625cbdf7536cebf2a2ea51cafd76be0
                                                                                                                  • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                                                                                                  • Opcode Fuzzy Hash: 82bd679fba3198f42106cba0c187218fd625cbdf7536cebf2a2ea51cafd76be0
                                                                                                                  • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                                                                                                  APIs
                                                                                                                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: DecodePointer
                                                                                                                  • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                                  • API String ID: 3527080286-3064271455
                                                                                                                  • Opcode ID: 51615691f6b39088fe699d356a3785f8ab9cde05a1526f2a2544731867ca73e1
                                                                                                                  • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                                                                                                                  • Opcode Fuzzy Hash: 51615691f6b39088fe699d356a3785f8ab9cde05a1526f2a2544731867ca73e1
                                                                                                                  • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                                                                                                                  APIs
                                                                                                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                                                                                                    • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                  • Sleep.KERNEL32(00000064), ref: 00416688
                                                                                                                  • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                                  • API String ID: 1462127192-2001430897
                                                                                                                  • Opcode ID: c9e55723ecb2ee04230f435addb8f16ed6a8a05fe378bed3b576d9dff6fd58f4
                                                                                                                  • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                                                                                                  • Opcode Fuzzy Hash: c9e55723ecb2ee04230f435addb8f16ed6a8a05fe378bed3b576d9dff6fd58f4
                                                                                                                  • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                                                                                                  APIs
                                                                                                                  • _strftime.LIBCMT ref: 00401AD3
                                                                                                                    • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                                  • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                                                                                                  • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                                                                                                  • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                                  • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                                                                                                  • API String ID: 3809562944-3643129801
                                                                                                                  • Opcode ID: a0d4b68123ccb8690edebec149ad94aabf9f76f5131ed63dacbc39586bcb4aec
                                                                                                                  • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                                                                                                  • Opcode Fuzzy Hash: a0d4b68123ccb8690edebec149ad94aabf9f76f5131ed63dacbc39586bcb4aec
                                                                                                                  • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                                                                                                  APIs
                                                                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                                                                  • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                                                                                  • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                                                                                                  • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                                                                                                  • waveInStart.WINMM ref: 00401A81
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                                  • String ID: XCG$`=G$x=G
                                                                                                                  • API String ID: 1356121797-903574159
                                                                                                                  • Opcode ID: b9d79b778b34dfc6f1519f8bfd66b07f48f7a9fbc911d0f23052e1d1eeff0420
                                                                                                                  • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                                                                                                  • Opcode Fuzzy Hash: b9d79b778b34dfc6f1519f8bfd66b07f48f7a9fbc911d0f23052e1d1eeff0420
                                                                                                                  • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                                                                                                  APIs
                                                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                                                                                                    • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                                                    • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                                                    • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                                                                                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                                                                                                  • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                                                                                                                  • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                                                                                                                  • TranslateMessage.USER32(?), ref: 0041C9FB
                                                                                                                  • DispatchMessageA.USER32(?), ref: 0041CA05
                                                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                                  • String ID: Remcos
                                                                                                                  • API String ID: 1970332568-165870891
                                                                                                                  • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                                                  • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                                                                                                  • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                                                  • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: b03e61c4093a21660133e67fc3f0c2c165a648bd703d9864a2b1dbb5c11dd296
                                                                                                                  • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                                                                                                  • Opcode Fuzzy Hash: b03e61c4093a21660133e67fc3f0c2c165a648bd703d9864a2b1dbb5c11dd296
                                                                                                                  • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                                                                                                  APIs
                                                                                                                  • GetCPInfo.KERNEL32(?,?), ref: 00452BD6
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452C59
                                                                                                                  • __alloca_probe_16.LIBCMT ref: 00452C91
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452CEC
                                                                                                                  • __alloca_probe_16.LIBCMT ref: 00452D3B
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452D03
                                                                                                                    • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452D7F
                                                                                                                  • __freea.LIBCMT ref: 00452DAA
                                                                                                                  • __freea.LIBCMT ref: 00452DB6
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 201697637-0
                                                                                                                  • Opcode ID: cde961f71f83e5614e0e0585355dc136788689c58c90c98609e3e8ecc25f0046
                                                                                                                  • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                                                                                                  • Opcode Fuzzy Hash: cde961f71f83e5614e0e0585355dc136788689c58c90c98609e3e8ecc25f0046
                                                                                                                  • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                  • _memcmp.LIBVCRUNTIME ref: 004446A3
                                                                                                                  • _free.LIBCMT ref: 00444714
                                                                                                                  • _free.LIBCMT ref: 0044472D
                                                                                                                  • _free.LIBCMT ref: 0044475F
                                                                                                                  • _free.LIBCMT ref: 00444768
                                                                                                                  • _free.LIBCMT ref: 00444774
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                                  • String ID: C
                                                                                                                  • API String ID: 1679612858-1037565863
                                                                                                                  • Opcode ID: c6fcd5880bd625b4a5129d8bb50f9dce15208ec8dbffb9e3d29668755d1ef29e
                                                                                                                  • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                                                                                                  • Opcode Fuzzy Hash: c6fcd5880bd625b4a5129d8bb50f9dce15208ec8dbffb9e3d29668755d1ef29e
                                                                                                                  • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: tcp$udp
                                                                                                                  • API String ID: 0-3725065008
                                                                                                                  • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                                                                  • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                                                                                                  • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                                                                  • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free
                                                                                                                  • String ID: gKE$HE$HE
                                                                                                                  • API String ID: 269201875-2777690135
                                                                                                                  • Opcode ID: fc29a47a32afb3350fc3e3c96543f328580f9b5143c0f3ce58bfce5294a38304
                                                                                                                  • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                                                                                                  • Opcode Fuzzy Hash: fc29a47a32afb3350fc3e3c96543f328580f9b5143c0f3ce58bfce5294a38304
                                                                                                                  • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                                                                                                  APIs
                                                                                                                  • ExitThread.KERNEL32 ref: 004017F4
                                                                                                                    • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                                                    • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                                                                  • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                                                                                                    • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                                                  • __Init_thread_footer.LIBCMT ref: 004017BC
                                                                                                                    • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                                                    • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                                  • String ID: T=G$p[G$>G$>G
                                                                                                                  • API String ID: 1596592924-2461731529
                                                                                                                  • Opcode ID: b033b66669596b249d1ce25b62a4281e1d13c05af68800beb23af724c3c7b6f6
                                                                                                                  • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                                                                                                  • Opcode Fuzzy Hash: b033b66669596b249d1ce25b62a4281e1d13c05af68800beb23af724c3c7b6f6
                                                                                                                  • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                                                                                                  APIs
                                                                                                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                                                                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                                                                                    • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                                                    • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                                  • String ID: .part
                                                                                                                  • API String ID: 1303771098-3499674018
                                                                                                                  • Opcode ID: d50e3930c99f8cddacc32f51ad6110cbbcfbd567f3e003bfc65bfd9ee2b121de
                                                                                                                  • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                                                                                                  • Opcode Fuzzy Hash: d50e3930c99f8cddacc32f51ad6110cbbcfbd567f3e003bfc65bfd9ee2b121de
                                                                                                                  • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                                                                                                    • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                                                                                                    • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                                                                                                    • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                                                  • _wcslen.LIBCMT ref: 0041A8F6
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                                                                  • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                                                                                                  • API String ID: 37874593-703403762
                                                                                                                  • Opcode ID: aa5f3d36ce9772210bd4ab0c541c77e8bdbd068386b6e6afd822d477f8b40dee
                                                                                                                  • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                                                                                                                  • Opcode Fuzzy Hash: aa5f3d36ce9772210bd4ab0c541c77e8bdbd068386b6e6afd822d477f8b40dee
                                                                                                                  • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                                                                                                                  APIs
                                                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043D564,0043D564,?,?,?,00449BA1,00000001,00000001,1AE85006), ref: 004499AA
                                                                                                                  • __alloca_probe_16.LIBCMT ref: 004499E2
                                                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00449BA1,00000001,00000001,1AE85006,?,?,?), ref: 00449A30
                                                                                                                  • __alloca_probe_16.LIBCMT ref: 00449AC7
                                                                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                                                                                                  • __freea.LIBCMT ref: 00449B37
                                                                                                                    • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                                                  • __freea.LIBCMT ref: 00449B40
                                                                                                                  • __freea.LIBCMT ref: 00449B65
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3864826663-0
                                                                                                                  • Opcode ID: 352025556551dac2c37919268567461b7de28f4f732b96d5dc4c3903fd0b0184
                                                                                                                  • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                                                                                                  • Opcode Fuzzy Hash: 352025556551dac2c37919268567461b7de28f4f732b96d5dc4c3903fd0b0184
                                                                                                                  • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                                                                                                  APIs
                                                                                                                  • SendInput.USER32 ref: 00418B08
                                                                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                                                                                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                                                                                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                                                                                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                                                                                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                                                                                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                                                                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                                                                                                    • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: InputSend$Virtual
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1167301434-0
                                                                                                                  • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                                                  • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                                                                                                                  • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                                                  • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                                                                                                                  APIs
                                                                                                                  • OpenClipboard.USER32 ref: 00415A46
                                                                                                                  • EmptyClipboard.USER32 ref: 00415A54
                                                                                                                  • CloseClipboard.USER32 ref: 00415A5A
                                                                                                                  • OpenClipboard.USER32 ref: 00415A61
                                                                                                                  • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                                                  • CloseClipboard.USER32 ref: 00415A89
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2172192267-0
                                                                                                                  • Opcode ID: 6a9ec668e7fdea89666e78c86b70ee6c6b12921e874800debc66150193591dc0
                                                                                                                  • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                                                                                                                  • Opcode Fuzzy Hash: 6a9ec668e7fdea89666e78c86b70ee6c6b12921e874800debc66150193591dc0
                                                                                                                  • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 269201875-0
                                                                                                                  • Opcode ID: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                                                                                                                  • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                                                                                                  • Opcode Fuzzy Hash: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                                                                                                                  • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                                                  • _free.LIBCMT ref: 00444086
                                                                                                                  • _free.LIBCMT ref: 0044409D
                                                                                                                  • _free.LIBCMT ref: 004440BC
                                                                                                                  • _free.LIBCMT ref: 004440D7
                                                                                                                  • _free.LIBCMT ref: 004440EE
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free$AllocateHeap
                                                                                                                  • String ID: J7D
                                                                                                                  • API String ID: 3033488037-1677391033
                                                                                                                  • Opcode ID: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                                                                                                                  • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                                                                                                                  • Opcode Fuzzy Hash: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                                                                                                                  • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                                                                                                                  APIs
                                                                                                                  • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                                                                                                                  • __fassign.LIBCMT ref: 0044A180
                                                                                                                  • __fassign.LIBCMT ref: 0044A19B
                                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                                                                                                                  • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                                                                                                  • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1324828854-0
                                                                                                                  • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                                                  • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                                                                                                  • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                                                  • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                                                                                                  APIs
                                                                                                                  • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                                                                                                    • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                                                    • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseEnumInfoOpenQuerysend
                                                                                                                  • String ID: TUFTUF$>G$DG$DG
                                                                                                                  • API String ID: 3114080316-344394840
                                                                                                                  • Opcode ID: a7cbbf494201fdfd46b352284ff1bc29af0ab57b085014640ab1cd51c4bb0307
                                                                                                                  • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                                                                                                                  • Opcode Fuzzy Hash: a7cbbf494201fdfd46b352284ff1bc29af0ab57b085014640ab1cd51c4bb0307
                                                                                                                  • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                                                                                                  APIs
                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00437B41
                                                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                  • String ID: csm
                                                                                                                  • API String ID: 1170836740-1018135373
                                                                                                                  • Opcode ID: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                                                                  • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                                                                                                  • Opcode Fuzzy Hash: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                                                                  • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                                    • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                                    • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                                                                  • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                                  • API String ID: 1133728706-4073444585
                                                                                                                  • Opcode ID: ed863c921e9cafa649e96df88b724608b92e8b32daa03b13c741907c5a10fac7
                                                                                                                  • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                                                                                                  • Opcode Fuzzy Hash: ed863c921e9cafa649e96df88b724608b92e8b32daa03b13c741907c5a10fac7
                                                                                                                  • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: ac8429af2de8aec4c7be5426e4bb47fdde12a831901fd5511e93482c0d59407e
                                                                                                                  • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                                                                                                  • Opcode Fuzzy Hash: ac8429af2de8aec4c7be5426e4bb47fdde12a831901fd5511e93482c0d59407e
                                                                                                                  • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                                                                                                  APIs
                                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                                                                                                  • int.LIBCPMT ref: 0040FC0F
                                                                                                                    • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                                                    • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                                                  • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                                  • String ID: P[G
                                                                                                                  • API String ID: 2536120697-571123470
                                                                                                                  • Opcode ID: 080c8d6f573d4b518caf4e655f0fcc3a1f7fca7e624085fd0a478c15266a48d0
                                                                                                                  • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                                                                                                                  • Opcode Fuzzy Hash: 080c8d6f573d4b518caf4e655f0fcc3a1f7fca7e624085fd0a478c15266a48d0
                                                                                                                  • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                                                                                                                  • _free.LIBCMT ref: 0044FD29
                                                                                                                    • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                                                  • _free.LIBCMT ref: 0044FD34
                                                                                                                  • _free.LIBCMT ref: 0044FD3F
                                                                                                                  • _free.LIBCMT ref: 0044FD93
                                                                                                                  • _free.LIBCMT ref: 0044FD9E
                                                                                                                  • _free.LIBCMT ref: 0044FDA9
                                                                                                                  • _free.LIBCMT ref: 0044FDB4
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 776569668-0
                                                                                                                  • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                                  • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                                                                                                                  • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                                  • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                                                                                                                  APIs
                                                                                                                  • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\SC_TR126089907.exe), ref: 00406835
                                                                                                                    • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                                                                                    • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                                                  • CoUninitialize.OLE32 ref: 0040688E
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: InitializeObjectUninitialize_wcslen
                                                                                                                  • String ID: C:\Users\user\Desktop\SC_TR126089907.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                                  • API String ID: 3851391207-3672380635
                                                                                                                  • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                                                                  • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                                                                                                  • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                                                                  • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                                                                                                  APIs
                                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                                                                                                  • int.LIBCPMT ref: 0040FEF2
                                                                                                                    • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                                                    • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                                                  • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                                  • String ID: H]G
                                                                                                                  • API String ID: 2536120697-1717957184
                                                                                                                  • Opcode ID: 4f42b0104d3fab8d9c54d588918312ac25f5cdf33bdc383dd9a32706d08bdfcf
                                                                                                                  • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                                                                                                                  • Opcode Fuzzy Hash: 4f42b0104d3fab8d9c54d588918312ac25f5cdf33bdc383dd9a32706d08bdfcf
                                                                                                                  • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                                                                                                                  APIs
                                                                                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                                                                                  • GetLastError.KERNEL32 ref: 0040B2EE
                                                                                                                  Strings
                                                                                                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                                                                                  • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                                                                                  • [Chrome Cookies not found], xrefs: 0040B308
                                                                                                                  • UserProfile, xrefs: 0040B2B4
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: DeleteErrorFileLast
                                                                                                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                                  • API String ID: 2018770650-304995407
                                                                                                                  • Opcode ID: ec592ed9ccf4b9a5ae27431b7db5c03baafcaff9f2a5fd094053063a907b4898
                                                                                                                  • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                                                                                                                  • Opcode Fuzzy Hash: ec592ed9ccf4b9a5ae27431b7db5c03baafcaff9f2a5fd094053063a907b4898
                                                                                                                  • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                                                                                                                  APIs
                                                                                                                  • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                                                                                                                  • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                                                                                                                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Console$AllocOutputShowWindow
                                                                                                                  • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                                                                                                  • API String ID: 2425139147-2527699604
                                                                                                                  • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                                                                                  • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                                                                                                                  • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                                                                                  • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: (CG$C:\Users\user\Desktop\SC_TR126089907.exe$BG
                                                                                                                  • API String ID: 0-3232937908
                                                                                                                  • Opcode ID: b7a2e59ac2a9b4cfd69ae58ffa53ef09c4b6135ca76893af750d01e39a00b3fe
                                                                                                                  • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                                                                                                  • Opcode Fuzzy Hash: b7a2e59ac2a9b4cfd69ae58ffa53ef09c4b6135ca76893af750d01e39a00b3fe
                                                                                                                  • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                                                                                                  APIs
                                                                                                                  • __allrem.LIBCMT ref: 00439789
                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                                                                                                  • __allrem.LIBCMT ref: 004397BC
                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                                                                                                  • __allrem.LIBCMT ref: 004397F1
                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1992179935-0
                                                                                                                  • Opcode ID: e717a979b06a6d59714d5f6060216880ad0b40e6851c78038ac3081c6fc0778a
                                                                                                                  • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                                                                                                  • Opcode Fuzzy Hash: e717a979b06a6d59714d5f6060216880ad0b40e6851c78038ac3081c6fc0778a
                                                                                                                  • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: __cftoe
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4189289331-0
                                                                                                                  • Opcode ID: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                                                                                                                  • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                                                                                                  • Opcode Fuzzy Hash: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                                                                                                                  • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: __freea$__alloca_probe_16
                                                                                                                  • String ID: a/p$am/pm
                                                                                                                  • API String ID: 3509577899-3206640213
                                                                                                                  • Opcode ID: d47145a3bc1b7d9653af932916ed6ede224238620767b4a39004040ccf91a16a
                                                                                                                  • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                                                                                                  • Opcode Fuzzy Hash: d47145a3bc1b7d9653af932916ed6ede224238620767b4a39004040ccf91a16a
                                                                                                                  • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                                                                                                  APIs
                                                                                                                  • Sleep.KERNEL32(00000000), ref: 00403E8A
                                                                                                                    • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: H_prologSleep
                                                                                                                  • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                                                                                                                  • API String ID: 3469354165-462540288
                                                                                                                  • Opcode ID: 25a0f4193d6ce9d903107b1be8cfd58e430ba9181b3007ec8c1f7c1118c42728
                                                                                                                  • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                                                                                                                  • Opcode Fuzzy Hash: 25a0f4193d6ce9d903107b1be8cfd58e430ba9181b3007ec8c1f7c1118c42728
                                                                                                                  • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                                                                                                                  APIs
                                                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                                                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                                                                                                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 493672254-0
                                                                                                                  • Opcode ID: cc75d9dcd9698d489bd16d1529218808ef0209595e5e3940521ea5438231db37
                                                                                                                  • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                                                                                                                  • Opcode Fuzzy Hash: cc75d9dcd9698d489bd16d1529218808ef0209595e5e3940521ea5438231db37
                                                                                                                  • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                                                                                                                  APIs
                                                                                                                  • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                                                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                                                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                                                                                                                  • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3852720340-0
                                                                                                                  • Opcode ID: 621d246bd99772174e6328e27007d7fc44d2e9bedb07ae0db1c9b20682e519a8
                                                                                                                  • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                                                                                                                  • Opcode Fuzzy Hash: 621d246bd99772174e6328e27007d7fc44d2e9bedb07ae0db1c9b20682e519a8
                                                                                                                  • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                                                                                                                  APIs
                                                                                                                  • GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                                                  • _free.LIBCMT ref: 00446EF6
                                                                                                                  • _free.LIBCMT ref: 00446F1E
                                                                                                                  • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                                                                  • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                                                  • _abort.LIBCMT ref: 00446F3D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$_free$_abort
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3160817290-0
                                                                                                                  • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                                                                  • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                                                                                                                  • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                                                                  • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                                                                                                                  APIs
                                                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                                                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                                                                                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 221034970-0
                                                                                                                  • Opcode ID: 8c2c12d76111034d1ffd754af595e71f441d69217dbef0b08bd463c672326562
                                                                                                                  • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                                                                                                                  • Opcode Fuzzy Hash: 8c2c12d76111034d1ffd754af595e71f441d69217dbef0b08bd463c672326562
                                                                                                                  • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                                                                                                                  APIs
                                                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                                                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                                                                                                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 221034970-0
                                                                                                                  • Opcode ID: d7e55e87c4aa5de171478471ca9946ff37ffda1a29cecfda88707176146ab33a
                                                                                                                  • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                                                                                                                  • Opcode Fuzzy Hash: d7e55e87c4aa5de171478471ca9946ff37ffda1a29cecfda88707176146ab33a
                                                                                                                  • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                                                                                                                  APIs
                                                                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                                                                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                                                                                                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                                                                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 221034970-0
                                                                                                                  • Opcode ID: b25a7e1b6f2a79e6a708b03e077db022cb2e93733ffc263c18ea91644c8a084d
                                                                                                                  • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                                                                                                                  • Opcode Fuzzy Hash: b25a7e1b6f2a79e6a708b03e077db022cb2e93733ffc263c18ea91644c8a084d
                                                                                                                  • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                                                                                                                  APIs
                                                                                                                  • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Enum$InfoQueryValue
                                                                                                                  • String ID: [regsplt]$DG
                                                                                                                  • API String ID: 3554306468-1089238109
                                                                                                                  • Opcode ID: 668e6125bc102b06f08f4022fce7d3e72e6b7aa882a9d0668b883ab2701ec6ad
                                                                                                                  • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                                                                                                  • Opcode Fuzzy Hash: 668e6125bc102b06f08f4022fce7d3e72e6b7aa882a9d0668b883ab2701ec6ad
                                                                                                                  • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                                                    • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                                                                    • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                                                  • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                                                                                                    • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                                                    • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                                                                                                  • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                                                                                                                  • API String ID: 2974294136-753205382
                                                                                                                  • Opcode ID: 04bb198fbbe4769673077618b9268d4d887794de53c6d81a72813602c084add1
                                                                                                                  • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                                                                                                                  • Opcode Fuzzy Hash: 04bb198fbbe4769673077618b9268d4d887794de53c6d81a72813602c084add1
                                                                                                                  • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                                                                                                                  APIs
                                                                                                                  • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                                                  • GetLastError.KERNEL32 ref: 0041CA91
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                                  • String ID: 0$MsgWindowClass
                                                                                                                  • API String ID: 2877667751-2410386613
                                                                                                                  • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                                                                  • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                                                                                                  • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                                                                  • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                                                                                                  APIs
                                                                                                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00406A14
                                                                                                                  Strings
                                                                                                                  • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                                                                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseHandle$CreateProcess
                                                                                                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                                  • API String ID: 2922976086-4183131282
                                                                                                                  • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                                                  • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                                                                                                                  • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                                                  • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002), ref: 004425F9
                                                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 0044262F
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                                  • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                                                  • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                                                                                                  • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                                                  • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                                                                                                  APIs
                                                                                                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 0041277F
                                                                                                                  • RegSetValueExW.ADVAPI32(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,004742E0), ref: 004127AD
                                                                                                                  • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,004742E0), ref: 004127B8
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseCreateValue
                                                                                                                  • String ID: pth_unenc$BG
                                                                                                                  • API String ID: 1818849710-2233081382
                                                                                                                  • Opcode ID: ac20c6f818266d456b173dad8d641fd48acc3e355ae729c9f48089b2aa064521
                                                                                                                  • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                                                                                                  • Opcode Fuzzy Hash: ac20c6f818266d456b173dad8d641fd48acc3e355ae729c9f48089b2aa064521
                                                                                                                  • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                                                                                                  APIs
                                                                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,004745A8,00414DB5,00000000,00000000,00000001), ref: 00404AED
                                                                                                                  • SetEvent.KERNEL32(?), ref: 00404AF9
                                                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404B04
                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00404B0D
                                                                                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                                  • String ID: KeepAlive | Disabled
                                                                                                                  • API String ID: 2993684571-305739064
                                                                                                                  • Opcode ID: 526203e9eca74a7ac11616e6de4b704dd5e98db1e732fd16a6fd45517b5b1fbb
                                                                                                                  • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                                                                                                  • Opcode Fuzzy Hash: 526203e9eca74a7ac11616e6de4b704dd5e98db1e732fd16a6fd45517b5b1fbb
                                                                                                                  • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                                                                                                                  • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                                                                                                                  • Sleep.KERNEL32(00002710), ref: 00419F79
                                                                                                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                                                  • String ID: Alarm triggered
                                                                                                                  • API String ID: 614609389-2816303416
                                                                                                                  • Opcode ID: ca31e2b0ec9ffc7d76ba02616ca36f971eae7819ef66c75d3d88d4c06d2fc62c
                                                                                                                  • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                                                                                                                  • Opcode Fuzzy Hash: ca31e2b0ec9ffc7d76ba02616ca36f971eae7819ef66c75d3d88d4c06d2fc62c
                                                                                                                  • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                                                                                                                  APIs
                                                                                                                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                                                                                                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                                                                                                                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                                                                                                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                                                                                                                  Strings
                                                                                                                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                                                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                                                  • API String ID: 3024135584-2418719853
                                                                                                                  • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                                                                  • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                                                                                                  • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                                                                  • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 5145828a6066f50cf31ff859ee0e23af4d85e603a01b225214a849b1d7000abc
                                                                                                                  • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                                                                                                  • Opcode Fuzzy Hash: 5145828a6066f50cf31ff859ee0e23af4d85e603a01b225214a849b1d7000abc
                                                                                                                  • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                                                                                                  • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                                                                                                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                                                                                                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                                                                                                  • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3525466593-0
                                                                                                                  • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                                                                  • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                                                                                                  • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                                                                  • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                                                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                                                                                                    • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                                                                                                    • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                                                    • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4269425633-0
                                                                                                                  • Opcode ID: 964a5a3bd7df0bd74af3a8e998dd8357b76ed2a5e21fcabead6c3b94faed0554
                                                                                                                  • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                                                                                                  • Opcode Fuzzy Hash: 964a5a3bd7df0bd74af3a8e998dd8357b76ed2a5e21fcabead6c3b94faed0554
                                                                                                                  • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 269201875-0
                                                                                                                  • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                                                  • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                                                                                                  • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                                                  • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                                                                                                  APIs
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043E3ED,?,00000000,?,00000001,?,?,00000001,0043E3ED,?), ref: 0044FF20
                                                                                                                  • __alloca_probe_16.LIBCMT ref: 0044FF58
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044FFA9
                                                                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,004399BF,?), ref: 0044FFBB
                                                                                                                  • __freea.LIBCMT ref: 0044FFC4
                                                                                                                    • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 313313983-0
                                                                                                                  • Opcode ID: f170efb2dc1c6de9df76393386ebf7cd534c4364e4366eebd744cf228c8edce4
                                                                                                                  • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                                                                                                                  • Opcode Fuzzy Hash: f170efb2dc1c6de9df76393386ebf7cd534c4364e4366eebd744cf228c8edce4
                                                                                                                  • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                                                                                                                  APIs
                                                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                                                                                                    • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                                                                                                  • _free.LIBCMT ref: 0044E1A0
                                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 336800556-0
                                                                                                                  • Opcode ID: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                                                                                                                  • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                                                                                                  • Opcode Fuzzy Hash: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                                                                                                                  • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                                                                                                  APIs
                                                                                                                  • GetLastError.KERNEL32(0000000A,0000000B,0000000A,00445359,00440A9B,00000000,?,?,?,?,00440C7E,00000000,0000000A,000000FF,0000000A,00000000), ref: 00446F48
                                                                                                                  • _free.LIBCMT ref: 00446F7D
                                                                                                                  • _free.LIBCMT ref: 00446FA4
                                                                                                                  • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 00446FB1
                                                                                                                  • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 00446FBA
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$_free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3170660625-0
                                                                                                                  • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                                                                  • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                                                                                                                  • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                                                                  • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                                                                                                                  APIs
                                                                                                                  • _free.LIBCMT ref: 0044F7B5
                                                                                                                    • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                                                  • _free.LIBCMT ref: 0044F7C7
                                                                                                                  • _free.LIBCMT ref: 0044F7D9
                                                                                                                  • _free.LIBCMT ref: 0044F7EB
                                                                                                                  • _free.LIBCMT ref: 0044F7FD
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 776569668-0
                                                                                                                  • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                                                  • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                                                                                                  • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                                                  • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                                                                                                  APIs
                                                                                                                  • _free.LIBCMT ref: 00443305
                                                                                                                    • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                                                  • _free.LIBCMT ref: 00443317
                                                                                                                  • _free.LIBCMT ref: 0044332A
                                                                                                                  • _free.LIBCMT ref: 0044333B
                                                                                                                  • _free.LIBCMT ref: 0044334C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 776569668-0
                                                                                                                  • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                                                  • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                                                                                                  • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                                                  • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                                                                                                  APIs
                                                                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                                                                                                  • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                                                                                                  • IsWindowVisible.USER32(?), ref: 004167A1
                                                                                                                    • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                                                    • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ProcessWindow$Open$TextThreadVisible
                                                                                                                  • String ID: (FG
                                                                                                                  • API String ID: 3142014140-2273637114
                                                                                                                  • Opcode ID: 3dd28efe5d76cee74ea6306897125a5d17a8e39bd8f4c177ad1c2a9bab0656b7
                                                                                                                  • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                                                                                                  • Opcode Fuzzy Hash: 3dd28efe5d76cee74ea6306897125a5d17a8e39bd8f4c177ad1c2a9bab0656b7
                                                                                                                  • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                                                                                                  APIs
                                                                                                                  • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                                                                    • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                                                    • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                                                    • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                                                                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                                                                  • String ID: XCG$`AG$>G
                                                                                                                  • API String ID: 2334542088-2372832151
                                                                                                                  • Opcode ID: e67731c2ca2cd1ff7fa0b2f8b36e1bf7c54a8ac1d8c345ee0f34ef58a03dc72b
                                                                                                                  • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                                                                                                  • Opcode Fuzzy Hash: e67731c2ca2cd1ff7fa0b2f8b36e1bf7c54a8ac1d8c345ee0f34ef58a03dc72b
                                                                                                                  • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                                                                                                  APIs
                                                                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\SC_TR126089907.exe,00000104), ref: 00442714
                                                                                                                  • _free.LIBCMT ref: 004427DF
                                                                                                                  • _free.LIBCMT ref: 004427E9
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: _free$FileModuleName
                                                                                                                  • String ID: C:\Users\user\Desktop\SC_TR126089907.exe
                                                                                                                  • API String ID: 2506810119-4195587962
                                                                                                                  • Opcode ID: 517ef8501d39ed80bd5d3989cd54e6cd38b7eb486680de81052e85c6479d25b4
                                                                                                                  • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                                                                                                  • Opcode Fuzzy Hash: 517ef8501d39ed80bd5d3989cd54e6cd38b7eb486680de81052e85c6479d25b4
                                                                                                                  • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                                                                                                  APIs
                                                                                                                  • send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                                  • WaitForSingleObject.KERNEL32(?,00000000,LAL,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000), ref: 0040450E
                                                                                                                  • SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000,?,?,?,?,?,00414CE9), ref: 0040453C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: EventObjectSingleWaitsend
                                                                                                                  • String ID: LAL
                                                                                                                  • API String ID: 3963590051-3302426157
                                                                                                                  • Opcode ID: 70199d1238e0ed40ec4566022559ff14c6a96e51f72a9672ed76f9bbc42e0496
                                                                                                                  • Instruction ID: 68c7e6670e460543dd9c105572fcb78fed3a06f13f8c8b410ea91b680b50408d
                                                                                                                  • Opcode Fuzzy Hash: 70199d1238e0ed40ec4566022559ff14c6a96e51f72a9672ed76f9bbc42e0496
                                                                                                                  • Instruction Fuzzy Hash: 192143B29001196BDF04BBA5DC96DEE777CFF54358B00013EF916B21E1EA78A604D6A4
                                                                                                                  APIs
                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                                                                    • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                                                    • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                                                    • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                                                    • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                  • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                                  • String ID: /sort "Visit Time" /stext "$8>G
                                                                                                                  • API String ID: 368326130-2663660666
                                                                                                                  • Opcode ID: 5f1f106a8e53b5b8e53ee6433b744230dbb61b51347ea29cf6ce568f23d562fb
                                                                                                                  • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                                                                                                  • Opcode Fuzzy Hash: 5f1f106a8e53b5b8e53ee6433b744230dbb61b51347ea29cf6ce568f23d562fb
                                                                                                                  • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0041B58F: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                                                                                  • ShellExecuteW.SHELL32(?,open,00000000), ref: 0040C632
                                                                                                                  • ExitProcess.KERNEL32 ref: 0040C63E
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateExecuteExitFileProcessShell
                                                                                                                  • String ID: fso.DeleteFile(Wscript.ScriptFullName)$open
                                                                                                                  • API String ID: 2309964880-3562070623
                                                                                                                  • Opcode ID: 390205f58295ca3481fe5ab8602b7fa4db45e117a05dec8e4925fefabcc5de7f
                                                                                                                  • Instruction ID: 568fed376c07edf90cd2df9b8610832c68d616ac56d6d0e00b2c9eff25916ff3
                                                                                                                  • Opcode Fuzzy Hash: 390205f58295ca3481fe5ab8602b7fa4db45e117a05dec8e4925fefabcc5de7f
                                                                                                                  • Instruction Fuzzy Hash: 692145315042405AC324FB25E8969BF77E4AFD1319F50493FF482620F2EF38AA49C69A
                                                                                                                  APIs
                                                                                                                  • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                                  • wsprintfW.USER32 ref: 0040A905
                                                                                                                    • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: EventLocalTimewsprintf
                                                                                                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                                                                  • API String ID: 1497725170-1359877963
                                                                                                                  • Opcode ID: fcd139a15132826d048fc9099f5513e63a32d772a8cf7c4d95b98b470fd5f9fd
                                                                                                                  • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                                                                                                                  • Opcode Fuzzy Hash: fcd139a15132826d048fc9099f5513e63a32d772a8cf7c4d95b98b470fd5f9fd
                                                                                                                  • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                                    • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateThread$LocalTime$wsprintf
                                                                                                                  • String ID: Online Keylogger Started
                                                                                                                  • API String ID: 112202259-1258561607
                                                                                                                  • Opcode ID: 54b0b085ce57371670bcfd3b34d5d472438fbf033b6369da0e754369fe511495
                                                                                                                  • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                                                                                                                  • Opcode Fuzzy Hash: 54b0b085ce57371670bcfd3b34d5d472438fbf033b6369da0e754369fe511495
                                                                                                                  • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                                                                                                  APIs
                                                                                                                  • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                                                                                                                  • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                                                                                                                  • __dosmaperr.LIBCMT ref: 0044AAFE
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                  • String ID: `@
                                                                                                                  • API String ID: 2583163307-951712118
                                                                                                                  • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                                                  • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                                                                                                                  • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                                                  • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                                                                                                                  APIs
                                                                                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                                                                                  • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseEventHandleObjectSingleWait
                                                                                                                  • String ID: Connection Timeout
                                                                                                                  • API String ID: 2055531096-499159329
                                                                                                                  • Opcode ID: 9041f7ae570b413ce327d744802055146d1c38930b1ad49fa8d24b0939116539
                                                                                                                  • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                                                                                                                  • Opcode Fuzzy Hash: 9041f7ae570b413ce327d744802055146d1c38930b1ad49fa8d24b0939116539
                                                                                                                  • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                                                                                                                  APIs
                                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                                                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                                                                                                    • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                                                                                                    • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                                                  • String ID: bad locale name
                                                                                                                  • API String ID: 3628047217-1405518554
                                                                                                                  • Opcode ID: 2c952230bb5508a40ba9b400b3509c8dd800ec2376424fb743b9d3d13ecaa97f
                                                                                                                  • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                                                                                                                  • Opcode Fuzzy Hash: 2c952230bb5508a40ba9b400b3509c8dd800ec2376424fb743b9d3d13ecaa97f
                                                                                                                  • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                                                                                                                  APIs
                                                                                                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ExecuteShell
                                                                                                                  • String ID: /C $cmd.exe$open
                                                                                                                  • API String ID: 587946157-3896048727
                                                                                                                  • Opcode ID: 6699625853e23096ac9cad3f7578a7bff2c993ae7ed2a6c2b658dd2f5a42760b
                                                                                                                  • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                                                                                                  • Opcode Fuzzy Hash: 6699625853e23096ac9cad3f7578a7bff2c993ae7ed2a6c2b658dd2f5a42760b
                                                                                                                  • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                                                                                                  APIs
                                                                                                                  • TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                                  • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                                  • TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: TerminateThread$HookUnhookWindows
                                                                                                                  • String ID: pth_unenc
                                                                                                                  • API String ID: 3123878439-4028850238
                                                                                                                  • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                                                  • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                                                                                                  • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                                                  • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressHandleModuleProc
                                                                                                                  • String ID: GetCursorInfo$User32.dll
                                                                                                                  • API String ID: 1646373207-2714051624
                                                                                                                  • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                                                                  • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                                                                                                                  • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                                                                  • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                                                                                                                  APIs
                                                                                                                  • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressLibraryLoadProc
                                                                                                                  • String ID: GetLastInputInfo$User32.dll
                                                                                                                  • API String ID: 2574300362-1519888992
                                                                                                                  • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                                                                  • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                                                                                                                  • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                                                                  • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: __alldvrm$_strrchr
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1036877536-0
                                                                                                                  • Opcode ID: 63f75d4c6ddf9dfadee5a9a28b1451e266bcc439c32975fae3941ae33d1a5297
                                                                                                                  • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                                                                                                                  • Opcode Fuzzy Hash: 63f75d4c6ddf9dfadee5a9a28b1451e266bcc439c32975fae3941ae33d1a5297
                                                                                                                  • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: d2c3ac181d975cfacaee5c3ec40136b8bdf5b2422b9dd14ab5655829a2308330
                                                                                                                  • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                                                                                                  • Opcode Fuzzy Hash: d2c3ac181d975cfacaee5c3ec40136b8bdf5b2422b9dd14ab5655829a2308330
                                                                                                                  • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                                                                                  • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Sleep
                                                                                                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                                  • API String ID: 3472027048-1236744412
                                                                                                                  • Opcode ID: fb9c94c919f491c47112702eb50a98d9c9131fc5c480903e1a404da5156a74b6
                                                                                                                  • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                                                                                                                  • Opcode Fuzzy Hash: fb9c94c919f491c47112702eb50a98d9c9131fc5c480903e1a404da5156a74b6
                                                                                                                  • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                    • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                    • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                  • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseOpenQuerySleepValue
                                                                                                                  • String ID: @CG$exepath$BG
                                                                                                                  • API String ID: 4119054056-3221201242
                                                                                                                  • Opcode ID: 210cb540f6a83319de20fac2fd682447bc31916e54f5a605e097a05a178efdaa
                                                                                                                  • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                                                                                                  • Opcode Fuzzy Hash: 210cb540f6a83319de20fac2fd682447bc31916e54f5a605e097a05a178efdaa
                                                                                                                  • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                                                                                                    • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                                                                                                    • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                                                                                                                  • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                                                                                  • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$SleepText$ForegroundLength
                                                                                                                  • String ID: [ $ ]
                                                                                                                  • API String ID: 3309952895-93608704
                                                                                                                  • Opcode ID: 92cb9d2a2d6bf6289d44fec474a7e000b4a54ab88b054bee990bed59a71b9a03
                                                                                                                  • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                                                                                                                  • Opcode Fuzzy Hash: 92cb9d2a2d6bf6289d44fec474a7e000b4a54ab88b054bee990bed59a71b9a03
                                                                                                                  • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                                                                  • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                                                                                                                  • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                                                                  • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                                                                  • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                                                                                                                  • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                                                                  • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                                                                                                                  APIs
                                                                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                                                                                                    • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                                                                                                    • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                                                                                                  • _UnwindNestedFrames.LIBCMT ref: 00438124
                                                                                                                  • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                                                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 737400349-0
                                                                                                                  • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                                  • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                                                                                                  • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                                  • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                                                                                                  APIs
                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                                                                                                  • GetLastError.KERNEL32(?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3177248105-0
                                                                                                                  • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                                                  • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                                                                                                  • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                                                  • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8
                                                                                                                  APIs
                                                                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B647
                                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B66C
                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041B67A
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: File$CloseCreateHandleReadSize
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3919263394-0
                                                                                                                  • Opcode ID: 0e0033f64f8451bb372a2b2a88171f1815919a66d822dbb045df1505d3cebfa8
                                                                                                                  • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                                                                                                  • Opcode Fuzzy Hash: 0e0033f64f8451bb372a2b2a88171f1815919a66d822dbb045df1505d3cebfa8
                                                                                                                  • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                                                                                                  APIs
                                                                                                                  • GetSystemMetrics.USER32(0000004C), ref: 00418519
                                                                                                                  • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                                                                                                                  • GetSystemMetrics.USER32(0000004E), ref: 00418525
                                                                                                                  • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: MetricsSystem
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4116985748-0
                                                                                                                  • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                                                                  • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                                                                                                                  • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                                                                  • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                                                                                                                  APIs
                                                                                                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseHandleOpenProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 39102293-0
                                                                                                                  • Opcode ID: db4a41822c85b6549257f18fa46790b7e5e5d5e6a524df97c50e7420b53bdc77
                                                                                                                  • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                                                                                                  • Opcode Fuzzy Hash: db4a41822c85b6549257f18fa46790b7e5e5d5e6a524df97c50e7420b53bdc77
                                                                                                                  • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                                                                                                  APIs
                                                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorHandling__start
                                                                                                                  • String ID: pow
                                                                                                                  • API String ID: 3213639722-2276729525
                                                                                                                  • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                                                                  • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                                                                                                                  • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                                                                  • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                                                                                                                  APIs
                                                                                                                  • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: Info
                                                                                                                  • String ID: $fD
                                                                                                                  • API String ID: 1807457897-3092946448
                                                                                                                  • Opcode ID: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                                                                                                  • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                                                                                                  • Opcode Fuzzy Hash: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                                                                                                  • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                                                                                                  APIs
                                                                                                                  • GetACP.KERNEL32(?,20001004,?,00000002), ref: 004509B9
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID: ACP$OCP
                                                                                                                  • API String ID: 0-711371036
                                                                                                                  • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                                                  • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                                                                                                  • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                                                  • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                                                                                                  APIs
                                                                                                                  • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                                                                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                  • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                                                                                                  Strings
                                                                                                                  • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: LocalTime
                                                                                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                                                                                  • API String ID: 481472006-1507639952
                                                                                                                  • Opcode ID: dc814d6e6e9b329a3c520177c865058c28860881db4f8f765c6194f4c7b1d50e
                                                                                                                  • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                                                                                                                  • Opcode Fuzzy Hash: dc814d6e6e9b329a3c520177c865058c28860881db4f8f765c6194f4c7b1d50e
                                                                                                                  • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                                                                                                                  APIs
                                                                                                                  • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: LocalTime
                                                                                                                  • String ID: | $%02i:%02i:%02i:%03i
                                                                                                                  • API String ID: 481472006-2430845779
                                                                                                                  • Opcode ID: d622afb61c2cb1ab41a02553fe090b68cebd57ba43e85abe14a248f4384d1e5f
                                                                                                                  • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                                                                                                                  • Opcode Fuzzy Hash: d622afb61c2cb1ab41a02553fe090b68cebd57ba43e85abe14a248f4384d1e5f
                                                                                                                  • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                                                                                                                  APIs
                                                                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ExistsFilePath
                                                                                                                  • String ID: alarm.wav$xIG
                                                                                                                  • API String ID: 1174141254-4080756945
                                                                                                                  • Opcode ID: 36f323d8f2bb9e76d772b055fe3e42ba41a64d0aa3630582bee8464c0ac7f47d
                                                                                                                  • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                                                                                                                  • Opcode Fuzzy Hash: 36f323d8f2bb9e76d772b055fe3e42ba41a64d0aa3630582bee8464c0ac7f47d
                                                                                                                  • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                                    • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                  • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                                                                                  • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                                  • String ID: Online Keylogger Stopped
                                                                                                                  • API String ID: 1623830855-1496645233
                                                                                                                  • Opcode ID: 646206393e16704f2753a74233abb12183abfc7c86e0053c12af51a0f8e1eb29
                                                                                                                  • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                                                                                                                  • Opcode Fuzzy Hash: 646206393e16704f2753a74233abb12183abfc7c86e0053c12af51a0f8e1eb29
                                                                                                                  • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                                                                                                                  APIs
                                                                                                                  • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                                                                                                  • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: wave$BufferHeaderPrepare
                                                                                                                  • String ID: T=G
                                                                                                                  • API String ID: 2315374483-379896819
                                                                                                                  • Opcode ID: ed973bd8c39c0a7b185882100a87dfb7002c9bb2a5c1b7b6d1ae35d6c30925d6
                                                                                                                  • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                                                                                                  • Opcode Fuzzy Hash: ed973bd8c39c0a7b185882100a87dfb7002c9bb2a5c1b7b6d1ae35d6c30925d6
                                                                                                                  • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                                                                                                  APIs
                                                                                                                  • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: LocaleValid
                                                                                                                  • String ID: IsValidLocaleName$j=D
                                                                                                                  • API String ID: 1901932003-3128777819
                                                                                                                  • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                                                  • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                                                                                                  • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                                                  • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: H_prolog
                                                                                                                  • String ID: T=G$T=G
                                                                                                                  • API String ID: 3519838083-3732185208
                                                                                                                  • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                                                                                                  • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                                                                                                                  • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                                                                                                  • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                                                                                                                  APIs
                                                                                                                  • GetKeyState.USER32(00000011), ref: 0040AD5B
                                                                                                                    • Part of subcall function 00409B10: GetForegroundWindow.USER32(?,?,004740F8), ref: 00409B3F
                                                                                                                    • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                                    • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                                    • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                                    • Part of subcall function 00409B10: GetKeyboardState.USER32(?,?,004740F8), ref: 00409B67
                                                                                                                    • Part of subcall function 00409B10: ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                                    • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                                    • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                                                  • String ID: [AltL]$[AltR]
                                                                                                                  • API String ID: 2738857842-2658077756
                                                                                                                  • Opcode ID: 80506e14bf35cdfd57388ac48183fdf9bd6fb207497dbc1ccda1b4521432daf8
                                                                                                                  • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                                                                                                  • Opcode Fuzzy Hash: 80506e14bf35cdfd57388ac48183fdf9bd6fb207497dbc1ccda1b4521432daf8
                                                                                                                  • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                                                                                                  APIs
                                                                                                                  • _free.LIBCMT ref: 00448825
                                                                                                                    • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorFreeHeapLast_free
                                                                                                                  • String ID: `@$`@
                                                                                                                  • API String ID: 1353095263-20545824
                                                                                                                  • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                                  • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                                                                                                                  • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                                  • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                                                                                                                  APIs
                                                                                                                  • GetKeyState.USER32(00000012), ref: 0040ADB5
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: State
                                                                                                                  • String ID: [CtrlL]$[CtrlR]
                                                                                                                  • API String ID: 1649606143-2446555240
                                                                                                                  • Opcode ID: d3bfbbd6b4e89cd63980a9ff1b49381952101389b4aa81d5fd12017d0c3b90ad
                                                                                                                  • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                                                                                                  • Opcode Fuzzy Hash: d3bfbbd6b4e89cd63980a9ff1b49381952101389b4aa81d5fd12017d0c3b90ad
                                                                                                                  • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                                                                                                  APIs
                                                                                                                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004742E0,004742F8,?,pth_unenc), ref: 00412988
                                                                                                                  • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412998
                                                                                                                  Strings
                                                                                                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: DeleteOpenValue
                                                                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                                  • API String ID: 2654517830-1051519024
                                                                                                                  • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                                                  • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                                                                                                  • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                                                  • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                                                                                                  APIs
                                                                                                                  • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                                                                                                  • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: DeleteDirectoryFileRemove
                                                                                                                  • String ID: pth_unenc
                                                                                                                  • API String ID: 3325800564-4028850238
                                                                                                                  • Opcode ID: b246b6ffa53a22d2799d5431088e9539915b729032b3d26a74de246411d0112c
                                                                                                                  • Instruction ID: b68931c7331ddc333ece9e06749e281aefc344294653c9eba2f2de372e339d66
                                                                                                                  • Opcode Fuzzy Hash: b246b6ffa53a22d2799d5431088e9539915b729032b3d26a74de246411d0112c
                                                                                                                  • Instruction Fuzzy Hash: FEE046715112108BC610AB31EC44AEBB398AB05316F00487FF8D3A36A1DE38A988CA98
                                                                                                                  APIs
                                                                                                                  • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                  • WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ObjectProcessSingleTerminateWait
                                                                                                                  • String ID: pth_unenc
                                                                                                                  • API String ID: 1872346434-4028850238
                                                                                                                  • Opcode ID: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                                                  • Instruction ID: 4302d9c34f7b4dbdac7fc8682473a51625df35810590c52ad239c14707b44b4b
                                                                                                                  • Opcode Fuzzy Hash: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                                                  • Instruction Fuzzy Hash: C1D0C938559211AFD7614B68BC08B453B6AA745222F108277F828413F1C72598A4AE1C
                                                                                                                  APIs
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                                                                                                                  • GetLastError.KERNEL32 ref: 0043FB02
                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000003.00000002.4144258275.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_3_2_400000_SC_TR126089907.jbxd
                                                                                                                  Yara matches
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1717984340-0
                                                                                                                  • Opcode ID: a3a9a9c7793c2081db5377885f607edf127f94d6c053b0090e31d102b176707d
                                                                                                                  • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                                                                                                  • Opcode Fuzzy Hash: a3a9a9c7793c2081db5377885f607edf127f94d6c053b0090e31d102b176707d
                                                                                                                  • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759