Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bpaymentcopy.exe

Overview

General Information

Sample name:bpaymentcopy.exe
Analysis ID:1566523
MD5:5205be9a501dae770c6e557b5fdaeebc
SHA1:a8a34796e05ac4ff1a0b92bdbbaedc01e8cedfa5
SHA256:aca540b3ad20e1fd49ec550107eff0c164990de1067a9542daf615465f82c331
Tags:exePaymentuser-cocaman
Infos:

Detection

HawkEye, MailPassView, PredatorPainRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected HawkEye Keylogger
Yara detected MailPassView
Yara detected PredatorPainRAT
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file has nameless sections
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected WebBrowserPassView password recovery tool
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • bpaymentcopy.exe (PID: 6616 cmdline: "C:\Users\user\Desktop\bpaymentcopy.exe" MD5: 5205BE9A501DAE770C6E557B5FDAEEBC)
    • bpaymentcopy.exe (PID: 6696 cmdline: "C:\Users\user\Desktop\bpaymentcopy.exe" MD5: 5205BE9A501DAE770C6E557B5FDAEEBC)
    • bpaymentcopy.exe (PID: 6468 cmdline: "C:\Users\user\Desktop\bpaymentcopy.exe" MD5: 5205BE9A501DAE770C6E557B5FDAEEBC)
      • Windows Update.exe (PID: 5272 cmdline: "C:\Users\user\AppData\Roaming\Windows Update.exe" MD5: 5205BE9A501DAE770C6E557B5FDAEEBC)
        • Windows Update.exe (PID: 728 cmdline: "C:\Users\user\AppData\Roaming\Windows Update.exe" MD5: 5205BE9A501DAE770C6E557B5FDAEEBC)
          • WerFault.exe (PID: 7104 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 728 -s 2052 MD5: C31336C1EFC2CCB44B4326EA793040F2)
          • vbc.exe (PID: 6324 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt" MD5: D881DE17AA8F2E2C08CBB7B265F928F9)
  • WindowsUpdate.exe (PID: 2888 cmdline: "C:\Users\user\AppData\Roaming\WindowsUpdate.exe" MD5: 5205BE9A501DAE770C6E557B5FDAEEBC)
    • WindowsUpdate.exe (PID: 4696 cmdline: "C:\Users\user\AppData\Roaming\WindowsUpdate.exe" MD5: 5205BE9A501DAE770C6E557B5FDAEEBC)
    • WindowsUpdate.exe (PID: 6364 cmdline: "C:\Users\user\AppData\Roaming\WindowsUpdate.exe" MD5: 5205BE9A501DAE770C6E557B5FDAEEBC)
  • WindowsUpdate.exe (PID: 5392 cmdline: "C:\Users\user\AppData\Roaming\WindowsUpdate.exe" MD5: 5205BE9A501DAE770C6E557B5FDAEEBC)
    • WindowsUpdate.exe (PID: 1524 cmdline: "C:\Users\user\AppData\Roaming\WindowsUpdate.exe" MD5: 5205BE9A501DAE770C6E557B5FDAEEBC)
      • WerFault.exe (PID: 5308 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 1300 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
HawkEye Keylogger, HawkEye, HawkEye RebornHawKeye is a keylogger that is distributed since 2013. Discovered by IBM X-Force, it is currently spread over phishing campaigns targeting businesses on a worldwide scale. It is designed to steal credentials from numerous applications but, in the last observed versions, new "loader capabilities" have been spotted. It is sold by its development team on dark web markets and hacking forums.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.hawkeye_keylogger
{"Protocol": "SMTP", "Username": "compensation@britishcrowncourt.net", "Password": "@Hustle007ky1", "Host": "mail.britishcrowncourt.net", "Port": "587"}
SourceRuleDescriptionAuthorStrings
0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
    0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_HawkEyeYara detected HawkEye KeyloggerJoe Security
      0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
        0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PredatorPainRATYara detected PredatorPainRATKevin Breen <kevin@techanarchy.net>
          0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpRAT_PredatorPainDetects PredatorPain RATKevin Breen <kevin@techanarchy.net>
          • 0x5ac92:$string1: holderwb.txt
          • 0x5acae:$string1: holderwb.txt
          • 0x5ae14:$string3: There is a file attached to this email
          • 0x5b41c:$string4: screens\screenshot
          • 0x597ab:$string5: Disablelogger
          • 0x59755:$string6: \pidloc.txt
          • 0x59295:$string7: clearie
          • 0x59853:$string7: clearie
          • 0x592a5:$string8: clearff
          • 0x5986b:$string8: clearff
          • 0x59a8c:$string9: emails should be sent to you shortly
          • 0x59f8c:$string11: open=Sys.exe
          • 0x5976d:$ver1: PredatorLogger
          • 0x59e6f:$ver3: Predator Pain
          • 0x5ac4e:$ver3: Predator Pain
          • 0x5adc3:$ver3: Predator Pain
          • 0x5b00e:$ver3: Predator Pain
          Click to see the 30 entries
          SourceRuleDescriptionAuthorStrings
          6.2.Windows Update.exe.39b9970.3.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
            15.2.WindowsUpdate.exe.3f93d46.0.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
              2.2.bpaymentcopy.exe.45e7ae.3.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
                6.2.Windows Update.exe.39b9970.3.raw.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
                  6.2.Windows Update.exe.3a2f7e0.2.raw.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
                    Click to see the 59 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\WindowsUpdate.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\Windows Update.exe, ProcessId: 728, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 207.204.50.48, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\AppData\Roaming\Windows Update.exe, Initiated: true, ProcessId: 728, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49711
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: bpaymentcopy.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeAvira: detection malicious, Label: HEUR/AGEN.1352223
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeAvira: detection malicious, Label: HEUR/AGEN.1352223
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpackMalware Configuration Extractor: HawkEye {"Protocol": "SMTP", "Username": "compensation@britishcrowncourt.net", "Password": "@Hustle007ky1", "Host": "mail.britishcrowncourt.net", "Port": "587"}
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeReversingLabs: Detection: 73%
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeReversingLabs: Detection: 73%
                    Source: bpaymentcopy.exeReversingLabs: Detection: 73%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeJoe Sandbox ML: detected
                    Source: bpaymentcopy.exeJoe Sandbox ML: detected
                    Source: bpaymentcopy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: bpaymentcopy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: Accessibility.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: Microsoft.VisualBasic.pdb4r source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Runtime.Remoting.pdbT source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: WindowsUpdate.exe, 00000010.00000002.3047251351.00000000010A9000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.pdbh source: WER755D.tmp.dmp.20.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: WindowsUpdate.exe, 00000010.00000002.3047251351.0000000001057000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Runtime.Remoting.pdbP source: WER755D.tmp.dmp.20.dr
                    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Core.ni.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: ?oC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.ni.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: bpaymentcopy.exe, 00000002.00000002.2022046096.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2715381783.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2709145607.0000000003016000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: c:\Users\Mysterio\Documents\Visual Studio 2012\Projects\Coronavirus\Coronavirus\obj\Debug\Coronavirus.pdbBSJB source: bpaymentcopy.exe, 00000000.00000002.3342905322.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000005.00000002.3342490521.0000000002FA0000.00000004.08000000.00040000.00000000.sdmp, Windows Update.exe, 00000005.00000002.3342864842.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3341159842.00000000031D1000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.00000000039B1000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: Accessibility.pdbTz source: WER755D.tmp.dmp.20.dr
                    Source: Binary string: System.Xml.ni.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: @o.pdb source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdbRSDS source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: n0C:\Windows\mscorlib.pdb source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Configuration.pdb8S source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Configuration.ni.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Runtime.Remoting.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Configuration.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Xml.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: WindowsUpdate.exe, 00000010.00000002.3047251351.0000000001088000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: >*oVisualBasic.pdb source: WindowsUpdate.exe, 00000010.00000002.2952697080.0000000000D88000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: %%.pdb source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Xml.pdbH source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: mscorlib.pdb source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: mscorlib.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Drawing.pdbAccessibility.dll source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Drawing.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Management.pdb source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Management.ni.pdb source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.pdb4 source: WER755D.tmp.dmp.20.dr
                    Source: Binary string: System.Core.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: nLC:\Windows\Microsoft.VisualBasic.pdb source: WindowsUpdate.exe, 00000010.00000002.2952697080.0000000000D88000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb0_ source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: symbols\dll\mscorlib.pdbLb source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbh source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: c:\Users\Mysterio\Documents\Visual Studio 2012\Projects\Coronavirus\Coronavirus\obj\Debug\Coronavirus.pdb source: bpaymentcopy.exe, 00000000.00000002.3342905322.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000005.00000002.3342490521.0000000002FA0000.00000004.08000000.00040000.00000000.sdmp, Windows Update.exe, 00000005.00000002.3342864842.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3341159842.00000000031D1000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: autorun.inf
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: [autorun]
                    Source: Windows Update.exe, 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                    Source: Windows Update.exe, 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $jq[autorun]
                    Source: WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                    Source: WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                    Source: WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                    Source: WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                    Source: global trafficTCP traffic: 192.168.2.5:49711 -> 207.204.50.48:587
                    Source: Joe Sandbox ViewASN Name: DEFENSE-NETUS DEFENSE-NETUS
                    Source: global trafficTCP traffic: 192.168.2.5:49711 -> 207.204.50.48:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                    Source: global trafficDNS traffic detected: DNS query: 75.103.13.0.in-addr.arpa
                    Source: global trafficDNS traffic detected: DNS query: mail.britishcrowncourt.net
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
                    Source: WindowsUpdate.exe, 0000000E.00000002.2908396687.0000000003131000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000010.00000002.3188318027.0000000002C93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo.com/foo
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: bpaymentcopy.exe, 00000002.00000002.2022046096.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000E.00000002.2908396687.0000000003131000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000010.00000002.3188318027.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://whatismyipaddress.com/-
                    Source: Windows Update.exe, 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.DeceptiveEngineering.com/path/logs.php
                    Source: WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: 15.2.WindowsUpdate.exe.3f93d46.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.45e7ae.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426f0c1.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.408949.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.Windows Update.exe.29db894.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, Form1.cs.Net Code: HookKeyboard
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\Windows Update.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: 15.2.WindowsUpdate.exe.3f93d46.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 15.2.WindowsUpdate.exe.3f93d46.0.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 2.2.bpaymentcopy.exe.45e7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 2.2.bpaymentcopy.exe.45e7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 2.2.bpaymentcopy.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 2.2.bpaymentcopy.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 12.2.WindowsUpdate.exe.426f0c1.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 12.2.WindowsUpdate.exe.426f0c1.4.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 12.2.WindowsUpdate.exe.4268578.5.unpack, type: UNPACKEDPEMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 12.2.WindowsUpdate.exe.4268578.5.unpack, type: UNPACKEDPEMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 2.2.bpaymentcopy.exe.408949.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 2.2.bpaymentcopy.exe.408949.2.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 6.2.Windows Update.exe.29db894.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 6.2.Windows Update.exe.29db894.1.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects PredatorPain RAT Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PredatorPain Author: Kevin Breen <kevin@techanarchy.net>
                    Source: Yara matchFile source: 15.2.WindowsUpdate.exe.3f93d46.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.45e7ae.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426f0c1.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.408949.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.Windows Update.exe.29db894.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: initial sampleStatic PE information: Filename: bpaymentcopy.exe
                    Source: bpaymentcopy.exeStatic PE information: section name:
                    Source: Windows Update.exe.2.drStatic PE information: section name:
                    Source: WindowsUpdate.exe.6.drStatic PE information: section name:
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_011889F00_2_011889F0
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_011808600_2_01180860
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_0118A8C00_2_0118A8C0
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_01184AE80_2_01184AE8
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_0118897F0_2_0118897F
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_01184A570_2_01184A57
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_01184AD80_2_01184AD8
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_01189CB00_2_01189CB0
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_04F900400_2_04F90040
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 2_2_02BAC0D82_2_02BAC0D8
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 2_2_053464702_2_05346470
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 5_2_013B07975_2_013B0797
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 5_2_013B89F05_2_013B89F0
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 5_2_013B08605_2_013B0860
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 5_2_013BA8C05_2_013BA8C0
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 5_2_013B4AE85_2_013B4AE8
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 5_2_013B4A6A5_2_013B4A6A
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 5_2_013B4AD85_2_013B4AD8
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 5_2_013B9CB05_2_013B9CB0
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 5_2_013B9CA05_2_013B9CA0
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_0275AE286_2_0275AE28
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_0275C0D86_2_0275C0D8
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_0275DAF06_2_0275DAF0
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_08EEE8886_2_08EEE888
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_08EEEEA86_2_08EEEEA8
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_08EE1F686_2_08EE1F68
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_018689F012_2_018689F0
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_0186A84912_2_0186A849
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_0186086012_2_01860860
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_01864AE812_2_01864AE8
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_018689E312_2_018689E3
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_0186A8C012_2_0186A8C0
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_01864AD812_2_01864AD8
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_01864A5712_2_01864A57
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_01869CA012_2_01869CA0
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_01869CB012_2_01869CB0
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 14_2_017BAE2814_2_017BAE28
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 14_2_017BC0D814_2_017BC0D8
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 14_2_017BDD4814_2_017BDD48
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_0135072015_2_01350720
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_013589F015_2_013589F0
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_0135080515_2_01350805
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_0135A8D015_2_0135A8D0
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_01354AE815_2_01354AE8
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_013589E215_2_013589E2
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_0135086015_2_01350860
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_0135A8C015_2_0135A8C0
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_01354AD815_2_01354AD8
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_01359CB015_2_01359CB0
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_01359CA015_2_01359CA0
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 16_2_00FFC0D816_2_00FFC0D8
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 16_2_00FFDD4816_2_00FFDD48
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 728 -s 2052
                    Source: bpaymentcopy.exe, 00000000.00000002.3338926906.0000000000B3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs bpaymentcopy.exe
                    Source: bpaymentcopy.exe, 00000000.00000002.3342905322.0000000002A31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoronavirus.dll8 vs bpaymentcopy.exe
                    Source: bpaymentcopy.exe, 00000000.00000002.3342905322.0000000002A31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs bpaymentcopy.exe
                    Source: bpaymentcopy.exe, 00000002.00000002.2022046096.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs bpaymentcopy.exe
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs bpaymentcopy.exe
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs bpaymentcopy.exe
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs bpaymentcopy.exe
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000490000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.exe4 vs bpaymentcopy.exe
                    Source: bpaymentcopy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 15.2.WindowsUpdate.exe.3f93d46.0.raw.unpack, type: UNPACKEDPEMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 15.2.WindowsUpdate.exe.3f93d46.0.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 2.2.bpaymentcopy.exe.45e7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 2.2.bpaymentcopy.exe.45e7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, type: UNPACKEDPEMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 2.2.bpaymentcopy.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 2.2.bpaymentcopy.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 12.2.WindowsUpdate.exe.426f0c1.4.raw.unpack, type: UNPACKEDPEMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 12.2.WindowsUpdate.exe.426f0c1.4.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 12.2.WindowsUpdate.exe.4268578.5.unpack, type: UNPACKEDPEMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 12.2.WindowsUpdate.exe.4268578.5.unpack, type: UNPACKEDPEMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 2.2.bpaymentcopy.exe.408949.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 2.2.bpaymentcopy.exe.408949.2.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, type: UNPACKEDPEMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 6.2.Windows Update.exe.29db894.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 6.2.Windows Update.exe.29db894.1.raw.unpack, type: UNPACKEDPEMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_PredatorPain date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects PredatorPain RAT, reference = http://malwareconfig.com/stats/PredatorPain
                    Source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: PredatorPain date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/PredatorPain
                    Source: bpaymentcopy.exeStatic PE information: Section: V_cv5Ei ZLIB complexity 1.0003175562352014
                    Source: Windows Update.exe.2.drStatic PE information: Section: V_cv5Ei ZLIB complexity 1.0003175562352014
                    Source: WindowsUpdate.exe.6.drStatic PE information: Section: V_cv5Ei ZLIB complexity 1.0003175562352014
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, Form1.csBase64 encoded string: 'Zl7QdZUnao4Dm7QjvpIm8FarFxCMcubt6hScGyARtcgWXXWkqLdW7Pi5ndNM+DtaAfjAFC+8iRysPjOiMEtmlBbVYl6xX8GxAj0R4mNp63k=', 'nZjafIAad0o0z4VdV5KKsAdE4EpmfQm4JYSROKdhecuTrq3CWgeATz0zGIY2ltmuiVXyvrS2Odt67/kGlgea0Q==', 'o+TXX1f4p+gSbuvb4Z4e9EvdPEKQvcXTEeE28Q81zlYofHgLZ6TEddQtqDC5sL6x/eAO8gPqsr0a/sgPQlsFurtt5//LcRwRH0pZwXRgcU9FUJrhoFevRT78Q2E8Q+IDJXBUQ8grbqzqZ2o4RpVM+g=='
                    Source: WindowsUpdate.exe, 00000010.00000002.3047251351.0000000001088000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/18@2/2
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeFile created: C:\Users\user\AppData\Roaming\Windows Update.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMutant created: NULL
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1524
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess728
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeFile created: C:\Users\user\AppData\Local\Temp\SysInfo.txtJump to behavior
                    Source: bpaymentcopy.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                    Source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                    Source: bpaymentcopy.exeReversingLabs: Detection: 73%
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeFile read: C:\Users\user\Desktop\bpaymentcopy.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\bpaymentcopy.exe "C:\Users\user\Desktop\bpaymentcopy.exe"
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess created: C:\Users\user\Desktop\bpaymentcopy.exe "C:\Users\user\Desktop\bpaymentcopy.exe"
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess created: C:\Users\user\Desktop\bpaymentcopy.exe "C:\Users\user\Desktop\bpaymentcopy.exe"
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess created: C:\Users\user\AppData\Roaming\Windows Update.exe "C:\Users\user\AppData\Roaming\Windows Update.exe"
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Users\user\AppData\Roaming\Windows Update.exe "C:\Users\user\AppData\Roaming\Windows Update.exe"
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 728 -s 2052
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 1300
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess created: C:\Users\user\Desktop\bpaymentcopy.exe "C:\Users\user\Desktop\bpaymentcopy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess created: C:\Users\user\Desktop\bpaymentcopy.exe "C:\Users\user\Desktop\bpaymentcopy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess created: C:\Users\user\AppData\Roaming\Windows Update.exe "C:\Users\user\AppData\Roaming\Windows Update.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Users\user\AppData\Roaming\Windows Update.exe "C:\Users\user\AppData\Roaming\Windows Update.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: msv1_0.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: ntlmshared.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: cryptdll.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: msv1_0.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: ntlmshared.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: cryptdll.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: msv1_0.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: ntlmshared.dll
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeSection loaded: cryptdll.dll
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: bpaymentcopy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: bpaymentcopy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: Accessibility.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: Microsoft.VisualBasic.pdb4r source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Runtime.Remoting.pdbT source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: WindowsUpdate.exe, 00000010.00000002.3047251351.00000000010A9000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.pdbh source: WER755D.tmp.dmp.20.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: WindowsUpdate.exe, 00000010.00000002.3047251351.0000000001057000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Runtime.Remoting.pdbP source: WER755D.tmp.dmp.20.dr
                    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Core.ni.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: ?oC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.ni.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: bpaymentcopy.exe, 00000002.00000002.2022046096.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2715381783.0000000008EF0000.00000004.08000000.00040000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2709145607.0000000003016000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000042E7000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: c:\Users\Mysterio\Documents\Visual Studio 2012\Projects\Coronavirus\Coronavirus\obj\Debug\Coronavirus.pdbBSJB source: bpaymentcopy.exe, 00000000.00000002.3342905322.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000005.00000002.3342490521.0000000002FA0000.00000004.08000000.00040000.00000000.sdmp, Windows Update.exe, 00000005.00000002.3342864842.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3341159842.00000000031D1000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.00000000039B1000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: Accessibility.pdbTz source: WER755D.tmp.dmp.20.dr
                    Source: Binary string: System.Xml.ni.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: @o.pdb source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdbRSDS source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: n0C:\Windows\mscorlib.pdb source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Configuration.pdb8S source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Configuration.ni.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Runtime.Remoting.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Configuration.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Xml.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: WindowsUpdate.exe, 00000010.00000002.3047251351.0000000001088000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: >*oVisualBasic.pdb source: WindowsUpdate.exe, 00000010.00000002.2952697080.0000000000D88000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: %%.pdb source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Xml.pdbH source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: mscorlib.pdb source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: mscorlib.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Drawing.pdbAccessibility.dll source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Drawing.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Management.pdb source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Management.ni.pdb source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.pdb4 source: WER755D.tmp.dmp.20.dr
                    Source: Binary string: System.Core.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: nLC:\Windows\Microsoft.VisualBasic.pdb source: WindowsUpdate.exe, 00000010.00000002.2952697080.0000000000D88000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb0_ source: WER8928.tmp.dmp.9.dr
                    Source: Binary string: symbols\dll\mscorlib.pdbLb source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbh source: Windows Update.exe, 00000006.00000002.2715638375.000000000A6DA000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: c:\Users\Mysterio\Documents\Visual Studio 2012\Projects\Coronavirus\Coronavirus\obj\Debug\Coronavirus.pdb source: bpaymentcopy.exe, 00000000.00000002.3342905322.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000005.00000002.3342490521.0000000002FA0000.00000004.08000000.00040000.00000000.sdmp, Windows Update.exe, 00000005.00000002.3342864842.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3341159842.00000000031D1000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdb source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WER755D.tmp.dmp.20.dr, WER8928.tmp.dmp.9.dr

                    Data Obfuscation

                    barindex
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly.Load(byte[])
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, Form1.cs.Net Code: run System.Reflection.Assembly.Load(byte[])
                    Source: bpaymentcopy.exeStatic PE information: section name: V_cv5Ei
                    Source: bpaymentcopy.exeStatic PE information: section name:
                    Source: Windows Update.exe.2.drStatic PE information: section name: V_cv5Ei
                    Source: Windows Update.exe.2.drStatic PE information: section name:
                    Source: WindowsUpdate.exe.6.drStatic PE information: section name: V_cv5Ei
                    Source: WindowsUpdate.exe.6.drStatic PE information: section name:
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_0118B588 push eax; iretd 0_2_0118B589
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 2_2_02BAF490 push esp; iretd 2_2_02BAF491
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 2_2_02BAF4D2 pushad ; iretd 2_2_02BAF4B9
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 2_2_02BAF512 pushfd ; iretd 2_2_02BAF519
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 2_2_05346CFA pushfd ; retf 0524h2_2_05346D11
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 5_2_013BB588 push eax; iretd 5_2_013BB589
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_0275F490 push esp; iretd 6_2_0275F491
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_08EE2AE0 push eax; ret 6_2_08EE2AC2
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_08EE2AA8 push eax; ret 6_2_08EE2AB2
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_08EE2AB8 push eax; ret 6_2_08EE2AC2
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_08EE2A98 push eax; ret 6_2_08EE2AA2
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_08EE2A6B push eax; ret 6_2_08EE2A92
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_08EE2A58 push eax; ret 6_2_08EE2A42
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeCode function: 6_2_08EE2A28 push eax; ret 6_2_08EE2A42
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 12_2_0186B588 push eax; iretd 12_2_0186B589
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 14_2_017BAAE0 push 24418B05h; ret 14_2_017BAAF3
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 14_2_017BF513 pushfd ; iretd 14_2_017BF519
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 14_2_017BF490 push esp; iretd 14_2_017BF491
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeCode function: 15_2_0135B588 push eax; iretd 15_2_0135B589
                    Source: bpaymentcopy.exeStatic PE information: section name: V_cv5Ei entropy: 7.9997060342549515
                    Source: Windows Update.exe.2.drStatic PE information: section name: V_cv5Ei entropy: 7.9997060342549515
                    Source: WindowsUpdate.exe.6.drStatic PE information: section name: V_cv5Ei entropy: 7.9997060342549515
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeFile created: C:\Users\user\AppData\Roaming\Windows Update.exeJump to dropped file
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeFile created: C:\Users\user\AppData\Roaming\WindowsUpdate.exeJump to dropped file
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows UpdateJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows UpdateJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (132).png
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced HiddenJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 728, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: WindowsUpdate.exe PID: 2888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: WindowsUpdate.exe PID: 5392, type: MEMORYSTR
                    Source: bpaymentcopy.exe, WindowsUpdate.exe.6.dr, Windows Update.exe.2.drBinary or memory string: L'). ONLY 'WINDBG.EXE' OR 'CDB.EXE' ARE SUPPORTED.
                    Source: bpaymentcopy.exe, WindowsUpdate.exe.6.dr, Windows Update.exe.2.drBinary or memory string: WINDBG.EXE
                    Source: bpaymentcopy.exe, WindowsUpdate.exe.6.dr, Windows Update.exe.2.drBinary or memory string: PLEASE EDIT THE PATH TO THE DEBUGGERS (WINDBG.EXE OR CDB.EXE).7
                    Source: bpaymentcopy.exe, WindowsUpdate.exe.6.dr, Windows Update.exe.2.drBinary or memory string: <DEBUGGER>: SUPPORTED DEBUGGERS ARE WINDBG.EXE AND CDB.EXE.
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeMemory allocated: D80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeMemory allocated: 2A30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeMemory allocated: 27B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeMemory allocated: 2D00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeMemory allocated: 4D00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory allocated: 1390000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory allocated: 50C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory allocated: E60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory allocated: 29B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory allocated: 28D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 1840000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 31D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 51D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 17B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 3130000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 5130000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 1350000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 2E10000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 4E10000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: FF0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 2C60000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory allocated: 4C60000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\bpaymentcopy.exe TID: 4404Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exe TID: 2964Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 1476Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 1852Thread sleep time: -120000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 3576Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 5012Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 5012Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 5012Thread sleep time: -99718s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 5012Thread sleep time: -99531s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 5012Thread sleep time: -99339s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 5012Thread sleep time: -99171s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 5012Thread sleep time: -99062s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 5012Thread sleep time: -98890s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 5012Thread sleep time: -43199s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exe TID: 5012Thread sleep time: -43015s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe TID: 2148Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe TID: 6764Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exe TID: 6848Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 120000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 99718Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 99531Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 99339Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 99171Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 99062Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 98890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 43199Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeThread delayed: delay time: 43015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeThread delayed: delay time: 922337203685477
                    Source: Amcache.hve.9.drBinary or memory string: VMware
                    Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: bpaymentcopy.exe, 00000002.00000002.2020679312.0000000000E36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}W
                    Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: bpaymentcopy.exe, 00000002.00000002.2020679312.0000000000E36000.00000004.00000020.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000E.00000002.2828790811.00000000015C7000.00000004.00000020.00020000.00000000.sdmp, WindowsUpdate.exe, 00000010.00000002.3047251351.00000000010A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: Windows Update.exe, 00000006.00000002.2708132026.0000000000A19000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllc
                    Source: bpaymentcopy.exe, 00000002.00000002.2113530787.0000000007210000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r&Prod_VMware_SA
                    Source: Amcache.hve.9.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.9.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.9.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_0118D248 CheckRemoteDebuggerPresent,0_2_0118D248
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess queried: DebugPort
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess queried: DebugPort
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeCode function: 0_2_01184AE8 LdrInitializeThunk,0_2_01184AE8
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, CMemoryExecute.cs.Net Code: Run contains injection code
                    Source: 2.2.bpaymentcopy.exe.2d5e0fc.4.raw.unpack, CMemoryExecute.cs.Net Code: Run contains injection code
                    Source: 6.2.Windows Update.exe.3126168.0.raw.unpack, CMemoryExecute.cs.Net Code: Run contains injection code
                    Source: 6.2.Windows Update.exe.8ef0000.4.raw.unpack, CMemoryExecute.cs.Net Code: Run contains injection code
                    Source: 12.2.WindowsUpdate.exe.42fc4dc.2.raw.unpack, CMemoryExecute.cs.Net Code: Run contains injection code
                    Source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, CMemoryExecute.cs.Net Code: Run contains injection code
                    Source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, CMemoryExecute.csReference to suspicious API methods: VirtualAllocEx((IntPtr)array4[0], intPtr, *(uint*)(ptr2 + 80), 12288u, 64u)
                    Source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, CMemoryExecute.csReference to suspicious API methods: NtWriteVirtualMemory((IntPtr)array4[0], intPtr, (IntPtr)ptr5, *(uint*)(ptr2 + 84), IntPtr.Zero)
                    Source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, CMemoryExecute.csReference to suspicious API methods: NtSetContextThread((IntPtr)array4[1], (IntPtr)ptr4)
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, RunPE.csReference to suspicious API methods: ReadProcessMemory(, , ref , 2, ref )
                    Source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, RunPE.csReference to suspicious API methods: WriteProcessMemory(array[0], , data, , ref )
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeMemory written: C:\Users\user\Desktop\bpaymentcopy.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeMemory written: C:\Users\user\AppData\Roaming\Windows Update.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory written: C:\Users\user\AppData\Roaming\WindowsUpdate.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeMemory written: C:\Users\user\AppData\Roaming\WindowsUpdate.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess created: C:\Users\user\Desktop\bpaymentcopy.exe "C:\Users\user\Desktop\bpaymentcopy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess created: C:\Users\user\Desktop\bpaymentcopy.exe "C:\Users\user\Desktop\bpaymentcopy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeProcess created: C:\Users\user\AppData\Roaming\Windows Update.exe "C:\Users\user\AppData\Roaming\Windows Update.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Users\user\AppData\Roaming\Windows Update.exe "C:\Users\user\AppData\Roaming\Windows Update.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeProcess created: C:\Users\user\AppData\Roaming\WindowsUpdate.exe "C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeQueries volume information: C:\Users\user\Desktop\bpaymentcopy.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeQueries volume information: C:\Users\user\Desktop\bpaymentcopy.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeQueries volume information: C:\Users\user\AppData\Roaming\Windows Update.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeQueries volume information: C:\Users\user\AppData\Roaming\Windows Update.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Users\user\AppData\Roaming\WindowsUpdate.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Users\user\AppData\Roaming\WindowsUpdate.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Users\user\AppData\Roaming\WindowsUpdate.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Users\user\AppData\Roaming\WindowsUpdate.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\WindowsUpdate.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                    Source: C:\Users\user\Desktop\bpaymentcopy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Windows Update.exe, 00000006.00000002.2713958753.00000000071F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                    Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 15.2.WindowsUpdate.exe.3f93d46.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.45e7ae.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426f0c1.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.408949.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.Windows Update.exe.29db894.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 6.2.Windows Update.exe.39b9970.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.WindowsUpdate.exe.3f93d46.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.45e7ae.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.Windows Update.exe.39b9970.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.WindowsUpdate.exe.3f93d46.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.45e7ae.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426f0c1.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.408949.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2712752940.00000000039B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: bpaymentcopy.exe PID: 6468, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 728, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: WindowsUpdate.exe PID: 2888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: WindowsUpdate.exe PID: 5392, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shmJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Windows Update.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-walJump to behavior
                    Source: Yara matchFile source: 6.2.Windows Update.exe.3a2f7e0.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.408949.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426f0c1.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426f0c1.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.408949.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.Windows Update.exe.3a2f7e0.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: bpaymentcopy.exe PID: 6468, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 728, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: WindowsUpdate.exe PID: 2888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: WindowsUpdate.exe PID: 5392, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 15.2.WindowsUpdate.exe.3f93d46.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.45e7ae.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.406f44.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426f0c1.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.bpaymentcopy.exe.408949.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.426d6bc.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.WindowsUpdate.exe.4268578.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.Windows Update.exe.29db894.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure1
                    Replication Through Removable Media
                    1
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    Peripheral Device Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    1
                    Registry Run Keys / Startup Folder
                    211
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    1
                    File and Directory Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Registry Run Keys / Startup Folder
                    21
                    Obfuscated Files or Information
                    Security Account Manager12
                    System Information Discovery
                    SMB/Windows Admin Shares21
                    Input Capture
                    1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS331
                    Security Software Discovery
                    Distributed Component Object Model1
                    Clipboard Data
                    11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                    Masquerading
                    Cached Domain Credentials41
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items41
                    Virtualization/Sandbox Evasion
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job211
                    Process Injection
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Hidden Files and Directories
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1566523 Sample: bpaymentcopy.exe Startdate: 02/12/2024 Architecture: WINDOWS Score: 100 53 mail.britishcrowncourt.net 2->53 55 75.103.13.0.in-addr.arpa 2->55 61 Found malware configuration 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 Antivirus detection for dropped file 2->65 67 19 other signatures 2->67 10 bpaymentcopy.exe 2->10         started        13 WindowsUpdate.exe 2->13         started        15 WindowsUpdate.exe 2->15         started        signatures3 process4 signatures5 75 Injects a PE file into a foreign processes 10->75 77 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 10->77 17 bpaymentcopy.exe 7 10->17         started        20 bpaymentcopy.exe 10->20         started        79 Antivirus detection for dropped file 13->79 81 Multi AV Scanner detection for dropped file 13->81 83 Machine Learning detection for dropped file 13->83 22 WindowsUpdate.exe 13->22         started        25 WindowsUpdate.exe 13->25         started        27 WindowsUpdate.exe 15->27         started        process6 dnsIp7 43 C:\Users\user\AppData\...\Windows Update.exe, PE32 17->43 dropped 45 C:\...\Windows Update.exe:Zone.Identifier, ASCII 17->45 dropped 47 C:\Users\user\...\bpaymentcopy.exe.log, ASCII 17->47 dropped 29 Windows Update.exe 17->29         started        59 127.0.0.1 unknown unknown 22->59 32 WerFault.exe 27->32         started        file8 process9 signatures10 85 Injects a PE file into a foreign processes 29->85 34 Windows Update.exe 1 6 29->34         started        process11 dnsIp12 57 mail.britishcrowncourt.net 207.204.50.48, 49711, 587 DEFENSE-NETUS United States 34->57 49 C:\Users\user\AppData\...\WindowsUpdate.exe, PE32 34->49 dropped 51 C:\...\WindowsUpdate.exe:Zone.Identifier, ASCII 34->51 dropped 69 Changes the view of files in windows explorer (hidden files and folders) 34->69 71 Tries to harvest and steal browser information (history, passwords, etc) 34->71 73 Installs a global keyboard hook 34->73 39 WerFault.exe 19 16 34->39         started        41 vbc.exe 34->41         started        file13 signatures14 process15

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    bpaymentcopy.exe74%ReversingLabsByteCode-MSIL.Trojan.AveMaria
                    bpaymentcopy.exe100%AviraHEUR/AGEN.1352223
                    bpaymentcopy.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\WindowsUpdate.exe100%AviraHEUR/AGEN.1352223
                    C:\Users\user\AppData\Roaming\Windows Update.exe100%AviraHEUR/AGEN.1352223
                    C:\Users\user\AppData\Roaming\WindowsUpdate.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\Windows Update.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\Windows Update.exe74%ReversingLabsByteCode-MSIL.Trojan.AveMaria
                    C:\Users\user\AppData\Roaming\WindowsUpdate.exe74%ReversingLabsByteCode-MSIL.Trojan.AveMaria
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.DeceptiveEngineering.com/path/logs.php0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.britishcrowncourt.net
                    207.204.50.48
                    truetrue
                      unknown
                      75.103.13.0.in-addr.arpa
                      unknown
                      unknownfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://upx.sf.netAmcache.hve.9.drfalse
                          high
                          http://www.nirsoft.net/WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.DeceptiveEngineering.com/path/logs.phpWindows Update.exe, 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namebpaymentcopy.exe, 00000002.00000002.2022046096.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000E.00000002.2908396687.0000000003131000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000010.00000002.3188318027.0000000002C61000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://foo.com/fooWindowsUpdate.exe, 0000000E.00000002.2908396687.0000000003131000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 00000010.00000002.3188318027.0000000002C93000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://whatismyipaddress.com/-bpaymentcopy.exe, 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, WindowsUpdate.exe, 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  207.204.50.48
                                  mail.britishcrowncourt.netUnited States
                                  55002DEFENSE-NETUStrue
                                  IP
                                  127.0.0.1
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1566523
                                  Start date and time:2024-12-02 11:29:05 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 6m 54s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:21
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:bpaymentcopy.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@21/18@2/2
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 195
                                  • Number of non-executed functions: 1
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 52.168.117.173, 20.189.173.20
                                  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, fs.microsoft.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                  • VT rate limit hit for: bpaymentcopy.exe
                                  TimeTypeDescription
                                  05:29:53API Interceptor1x Sleep call for process: bpaymentcopy.exe modified
                                  05:29:56API Interceptor13x Sleep call for process: Windows Update.exe modified
                                  05:31:02API Interceptor2x Sleep call for process: WerFault.exe modified
                                  11:30:11AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Windows Update C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                  11:30:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Windows Update C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                  No context
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  DEFENSE-NETUSphish_alert_iocp_v1.4.48 (80).emlGet hashmaliciousInvoiceScamBrowse
                                  • 107.162.175.186
                                  2stage.ps1Get hashmaliciousUnknownBrowse
                                  • 206.188.196.37
                                  2stage.ps1Get hashmaliciousUnknownBrowse
                                  • 206.188.196.37
                                  I_ Ultima richiesta di pagamento finale per Cuzziol beverage s_r_l__.msgGet hashmaliciousMint StealerBrowse
                                  • 206.188.196.37
                                  _DRP12938938231_PDF.jsGet hashmaliciousMint StealerBrowse
                                  • 206.188.196.37
                                  _DRP12938938231_PDF.jsGet hashmaliciousMint StealerBrowse
                                  • 206.188.196.37
                                  ryOpDCeOHz.ps1Get hashmaliciousUnknownBrowse
                                  • 206.188.196.37
                                  ryOpDCeOHz.ps1Get hashmaliciousUnknownBrowse
                                  • 206.188.196.37
                                  Fdoze89ykv.jsGet hashmaliciousMint StealerBrowse
                                  • 206.188.196.37
                                  Fdoze89ykv.jsGet hashmaliciousMint StealerBrowse
                                  • 206.188.196.37
                                  No context
                                  No context
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):1.3244266841928185
                                  Encrypted:false
                                  SSDEEP:192:4VgTF0r0BU/6a6U+mjZr6YiR1HezuiFnZ24IO8g:mgTFbBU/6aj0TezuiFnY4IO8g
                                  MD5:DA51C130CA2EF4B7CE6D38E5FD6C2CC2
                                  SHA1:EC678758A4D4BAA25BDC5C0D24E10D85D26D1282
                                  SHA-256:625FCA831A8BD77A29E8FB596D90B9B438AB31CE4A5EB6D3D9E87BFA2E66A602
                                  SHA-512:1587CB6E1D387A5D626AE3F1C11CA0AF10D6DA9D5A1EADA550A786D973324E6AAE9DD7160B89AAD4BD76924635D39BFD814FA54442F1FA7829F95034CF0B8E32
                                  Malicious:false
                                  Reputation:low
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.6.0.9.0.0.8.2.3.1.5.5.3.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.6.0.9.0.1.0.1.8.4.6.8.0.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.3.9.5.5.1.e.8.-.6.4.7.b.-.4.8.0.9.-.b.1.b.d.-.c.9.6.2.4.7.e.7.3.b.8.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.7.5.6.c.d.6.8.-.0.6.f.b.-.4.a.6.1.-.9.0.d.8.-.e.4.2.5.e.9.2.a.0.f.d.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.i.n.d.o.w.s. .U.p.d.a.t.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.b.p.a.y.m.e.n.t.c.o.p.y...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.d.8.-.0.0.0.1.-.0.0.1.4.-.d.2.d.4.-.f.7.2.0.a.5.4.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.f.1.8.9.6.5.2.3.0.b.6.4.f.0.4.0.c.1.e.4.2.2.6.1.1.3.7.b.6.b.f.0.0.0.0.0.0.0.0.!.0.0.0.0.a.8.a.3.4.7.9.6.e.0.5.a.c.4.f.f.1.a.0.b.9.2.b.d.b.b.a.e.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):1.0722736296332047
                                  Encrypted:false
                                  SSDEEP:192:X4lljWowAT0BU/Sa6U+momzuiFWZ24IO8o:AljxwPBU/SajlzuiFWY4IO8o
                                  MD5:526B919E679879EE7630A7C4F9406E2B
                                  SHA1:06EA0055E52FFBF8538692D567352FAD388E7F95
                                  SHA-256:EA116FB15708D2827AA3257CD20AEBA4035177CECCFF7BD52F75369D01AB8706
                                  SHA-512:54CD12D85E307CA62AF4667304517F663D28DF36F28BA5057EB29B470AC32ACA2977959A405FF992F6A86031EB2FFAE6840D35065327BD417E1A08F5CA0D1E24
                                  Malicious:false
                                  Reputation:low
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.6.0.9.0.6.8.6.4.2.1.9.2.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.6.0.9.0.7.3.0.3.2.8.2.5.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.1.1.f.f.d.0.7.-.e.3.8.2.-.4.5.c.b.-.b.6.4.7.-.e.6.9.2.0.3.9.0.8.4.2.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.d.6.1.1.b.b.d.-.5.f.7.9.-.4.1.f.c.-.a.2.4.a.-.f.d.9.e.8.1.f.a.2.c.d.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.i.n.d.o.w.s.U.p.d.a.t.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.b.p.a.y.m.e.n.t.c.o.p.y...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.f.4.-.0.0.0.1.-.0.0.1.4.-.d.f.f.d.-.9.c.3.b.a.5.4.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.f.1.8.9.6.5.2.3.0.b.6.4.f.0.4.0.c.1.e.4.2.2.6.1.1.3.7.b.6.b.f.0.0.0.0.0.0.0.0.!.0.0.0.0.a.8.a.3.4.7.9.6.e.0.5.a.c.4.f.f.1.a.0.b.9.2.b.d.b.b.a.e.d.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Mini DuMP crash report, 15 streams, Mon Dec 2 10:31:09 2024, 0x1205a4 type
                                  Category:dropped
                                  Size (bytes):248758
                                  Entropy (8bit):3.6986960177868773
                                  Encrypted:false
                                  SSDEEP:1536:0SyXdTtTF9ASVX4XuBojRC6cpN4uE2aOg0KuCDglA+LTgjiOe5tAxSF/y4Ct:0xrAyECp4uEqrKtf+LTguOiy4e
                                  MD5:B382EDCC9A469A82296FD35547354DFC
                                  SHA1:E1E8E2531F21043B53315F5FDD7AE6B994392DFF
                                  SHA-256:CD82D46EE6E7CBF096C12EE16DD64390F70B9C7B9E83999B02D56045194895A5
                                  SHA-512:65D4ADF5A9D8287996E9C261F3FDFED9334C66E0E4D9743BACBE438C531F1DCBC61914490FF15A0D442E40218056071DC46FA1FD0D5A85E25DFDE4E7F707D683
                                  Malicious:false
                                  Reputation:low
                                  Preview:MDMP..a..... .......m.Mg....................................$....!......D....K..........`.......8...........T...........`2..V............"...........#..............................................................................eJ.......$......GenuineIntel............T...........O.Mg............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8456
                                  Entropy (8bit):3.7008722724996987
                                  Encrypted:false
                                  SSDEEP:192:R6l7wVeJFe6T6YSQ6+gmfZiEqprd89b9dsfzfm:R6lXJM6T6Yd6+gmf8Ed9Wfi
                                  MD5:9BD25D956D7772F4F44C9298057E4072
                                  SHA1:18EF4E407C9BE82B74CA11A43575BEC81F0284D3
                                  SHA-256:7D2B741EBE14581184885748CEFD3450CC53245F6A63C608410571775BE03661
                                  SHA-512:DE76A67A37CC8231EEDD2E5A5ABE8BA3CCBD650F2C55390C1F6F6EB7DB0F4863A94C21CCF99F3AB54FBF344D3DCAC5FA78D6D2CFF7FA63C1E2095FBE51E8D5C0
                                  Malicious:false
                                  Reputation:low
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.5.2.4.<./.P.i.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4816
                                  Entropy (8bit):4.52345964140142
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zsZvJg77aI9VkFWpW8VYXYm8M4J59L2F9B+q8vP9L3Xu6BDwMvd:uIjfPI7807VnJDL4BKVL37BLvd
                                  MD5:4ED8744736B3E0283C120DE722FEA92D
                                  SHA1:F878EE63DDFDDC35232C707D8262344C3922F62D
                                  SHA-256:2EF7E7CA73D6E3ECA34900B8F492C6E0DA18073B99FFED6EF4E47E5BE54F90C2
                                  SHA-512:171B05C924AC8CF3A339EFCE14FA64C781D2F91727C5C1A746D05D568A83246773E8FF6DEF7D47BC8054025F5FE665CEB5630CE76A364D5FE2568DEA010F9957
                                  Malicious:false
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="613533" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Mini DuMP crash report, 15 streams, Mon Dec 2 10:30:08 2024, 0x1205a4 type
                                  Category:dropped
                                  Size (bytes):469883
                                  Entropy (8bit):3.8144957897561285
                                  Encrypted:false
                                  SSDEEP:3072:FmRDdEZUbwkfQXqn2cNdKB67NcAqyFXnz4uEqRryZ1FI9D6LTgJCTIVQqmMPsV:FmdIUsk32cNG6JcfyVz4+2qYTgHb0
                                  MD5:9104C8AACD2A526AACAB6F7D49A3EC94
                                  SHA1:C908E491609C15335B0C4FCDBE52C71153A0B138
                                  SHA-256:147886DAA6C1D92053760F08B4C2A0CE9278A4813DD1AC40501C6D84285CF167
                                  SHA-512:742C299DCD4EB3C983270986AF20D483A490AAFA2ED6996E7F14C597A8015F2D88D71FC2573BA3D2BA6B98958E0BA40F832E9EA86482036065ABDAC70C6D4B92
                                  Malicious:false
                                  Preview:MDMP..a..... .......0.Mg............T...........h&..h.......$....1......$E..:...........`.......8...........T............X..s............1...........3..............................................................................eJ......x4......GenuineIntel............T...........#.Mg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8434
                                  Entropy (8bit):3.693437978900866
                                  Encrypted:false
                                  SSDEEP:192:R6l7wVeJ6O620i6YVP6ygmfZo9qprP89bMBsfzakm:R6lXJL6O6Yt6ygmfi93M6fzY
                                  MD5:A3BF07006506234F440D29D2438CFE2E
                                  SHA1:BF85E76C33A5017AB4EF28CAD6C25A1D7FD6292D
                                  SHA-256:CA69F865210719005414F889F9ECC9DEFE84FF45C20163EB430B022CC3367D90
                                  SHA-512:F1739668851EA393B8860E65A2B9ECC805F3EA7E6D687939377DC1B5D7F3EAE5B00A90D5B484F677B183133D8AFF85F800BD5CB67D36C71091D5D523F47B038C
                                  Malicious:false
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.8.<./.P.i.d.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4779
                                  Entropy (8bit):4.461811923246923
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zsZAJg77aI9VkFWpW8VYmYm8M4JV9W+Fx+q8vx9W2XuyrWd:uIjfUI7807VuJflKrNJrWd
                                  MD5:06305C863FD75AB2DA7F32501E7CAA20
                                  SHA1:B176B4F61D28E0C30AB62AAB1893CCAAD4A1F172
                                  SHA-256:DD5B7B309B04EED57F0F7329B1D4A0D0E01CC2FAF087E8A53B271D57F955876C
                                  SHA-512:FF3954833C0E7CC4313D65DA5477CE6A39ACED37B92A42C16F538FD648DDE57DD1BC7A18EBC7050EB68D5D23D0A953639C4540B515FF0E429695E9B2D08150B2
                                  Malicious:false
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="613532" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1314
                                  Entropy (8bit):5.3387892510515025
                                  Encrypted:false
                                  SSDEEP:24:MLU84jE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4sAmE4Ks:MgvjHK5HKH1qHiYHKh3oPtHo6hAHKzeL
                                  MD5:8C61F9E2B19E0315722C135D70192939
                                  SHA1:BFC216104805B4183FD0A9153EE0B39076AECCBC
                                  SHA-256:AFA04F5408E6285A7B01334D40EA524ADB37116790061849F4D6B48D880D93A0
                                  SHA-512:55CC4879F5AC9C5BDB659D0DC915102B39BC2035CF1C3CADBF3BE6A4447B5613A9D665FC06AD3F461803D04495AAD5EAB0758C02B8F110090FF6F791B80B270D
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                  Process:C:\Users\user\Desktop\bpaymentcopy.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):1314
                                  Entropy (8bit):5.3387892510515025
                                  Encrypted:false
                                  SSDEEP:24:MLU84jE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4sAmE4Ks:MgvjHK5HKH1qHiYHKh3oPtHo6hAHKzeL
                                  MD5:8C61F9E2B19E0315722C135D70192939
                                  SHA1:BFC216104805B4183FD0A9153EE0B39076AECCBC
                                  SHA-256:AFA04F5408E6285A7B01334D40EA524ADB37116790061849F4D6B48D880D93A0
                                  SHA-512:55CC4879F5AC9C5BDB659D0DC915102B39BC2035CF1C3CADBF3BE6A4447B5613A9D665FC06AD3F461803D04495AAD5EAB0758C02B8F110090FF6F791B80B270D
                                  Malicious:true
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                  Process:C:\Users\user\Desktop\bpaymentcopy.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):40
                                  Entropy (8bit):4.193942707918268
                                  Encrypted:false
                                  SSDEEP:3:oNUWJRWHEupC:oNNJAi
                                  MD5:2C3D3244E652520C0EBC5ACB6A6B2EB1
                                  SHA1:988BF27CD1E668449FDDB9276A9F9539EA32CB9E
                                  SHA-256:303EA1C8253A82249CB1AF191A536ED8BD28E3AF00A1FA5B6ECB52ECBC1CD181
                                  SHA-512:8F7A55D214FEA0687D64B2C591FF913E401DAA855AA2588A274D8EC7CF3406F24D7B3928002E0A810041BB54FBE2D6FE65992C8AADD04C07F7984C6EA2068637
                                  Malicious:false
                                  Preview:C:\Users\user\Desktop\bpaymentcopy.exe
                                  Process:C:\Users\user\Desktop\bpaymentcopy.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):783360
                                  Entropy (8bit):7.767432012023201
                                  Encrypted:false
                                  SSDEEP:12288:LXNrylgwbJqMBSlxaZmvB008Jz1vakTLAJnElBaSP6XQ2lfix4phRDiaZEAmD:MgwkMYxcmUzgkTL2FSPd2ExQhJ
                                  MD5:5205BE9A501DAE770C6E557B5FDAEEBC
                                  SHA1:A8A34796E05AC4FF1A0B92BDBBAEDC01E8CEDFA5
                                  SHA-256:ACA540B3AD20E1FD49EC550107EFF0C164990DE1067A9542DAF615465F82C331
                                  SHA-512:E7177C8F6562363751DEDF374195ED0C59BA478530BA58E2428A62BA40FBAE73C9DC9F55CDF8890779A9A848C53D6FEDD7BDB9658E995DF7331D8EEA6A05170D
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 74%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ifFg.............................`... ... ....@.. ....................................@.................................X#..S.... .......................@.......................................................`............... ..H...........V_c.v5EiP.... ......................@....text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B.............`...................... ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\bpaymentcopy.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  Process:C:\Users\user\AppData\Roaming\Windows Update.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):783360
                                  Entropy (8bit):7.767432012023201
                                  Encrypted:false
                                  SSDEEP:12288:LXNrylgwbJqMBSlxaZmvB008Jz1vakTLAJnElBaSP6XQ2lfix4phRDiaZEAmD:MgwkMYxcmUzgkTL2FSPd2ExQhJ
                                  MD5:5205BE9A501DAE770C6E557B5FDAEEBC
                                  SHA1:A8A34796E05AC4FF1A0B92BDBBAEDC01E8CEDFA5
                                  SHA-256:ACA540B3AD20E1FD49EC550107EFF0C164990DE1067A9542DAF615465F82C331
                                  SHA-512:E7177C8F6562363751DEDF374195ED0C59BA478530BA58E2428A62BA40FBAE73C9DC9F55CDF8890779A9A848C53D6FEDD7BDB9658E995DF7331D8EEA6A05170D
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 74%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ifFg.............................`... ... ....@.. ....................................@.................................X#..S.... .......................@.......................................................`............... ..H...........V_c.v5EiP.... ......................@....text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B.............`...................... ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Roaming\Windows Update.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  Process:C:\Users\user\AppData\Roaming\Windows Update.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):3
                                  Entropy (8bit):1.584962500721156
                                  Encrypted:false
                                  SSDEEP:3:kdn:kd
                                  MD5:D4C2E4A3297FE25A71D030B67EB83BFC
                                  SHA1:8E6B8A73BCE7324E2B6E4AFA73EE4215B98E9432
                                  SHA-256:7C3D90003D7D645BE0B5F3782533C198A5D5DEE06870420B4D594976ED857FC3
                                  SHA-512:052C5360459C741BCD1BE57B40BC17BC6E57974C7196B575FCB66455BB1959D804E461676D2C1A3C1013450EA1C1E92A9D54084A6D27AF70A546BD5CEA37EE05
                                  Malicious:false
                                  Preview:728
                                  Process:C:\Users\user\AppData\Roaming\Windows Update.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):50
                                  Entropy (8bit):4.414177320667444
                                  Encrypted:false
                                  SSDEEP:3:oNUkh4EaKC59KYr4a:oN9aZ534a
                                  MD5:201BF2179D431C7E3205E5F410DCDB59
                                  SHA1:3F774846910F70FC1BCC69DE05E8F9EA4D893F34
                                  SHA-256:FBB871739943E63027102EF9DEECDFC261F94DD3FBB06087772EF705F182D13D
                                  SHA-512:0047D87CC9E2C50FB2217A4F1200973B575D30195BE7DF04E2F6B494350178568338FAA802DBE41AA47EC64C5A5699AC66B88D8C821CF2DD1F0EF1B93446F0E4
                                  Malicious:false
                                  Preview:C:\Users\user\AppData\Roaming\Windows Update.exe
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:MS Windows registry file, NT/2000 or above
                                  Category:dropped
                                  Size (bytes):1835008
                                  Entropy (8bit):4.421885934482715
                                  Encrypted:false
                                  SSDEEP:6144:mSvfpi6ceLP/9skLmb0OT3WSPHaJG8nAgeMZMMhA2fX4WABlEnN90uhiTw:FvloT3W+EZMM6DFyz03w
                                  MD5:08BC5B2231C78559A4AA729E11606D24
                                  SHA1:7DC06C886E4FE7B15B68EA06278DC5089824EA86
                                  SHA-256:420CEB689769333CC5D2B640B39A93D7D006D74E27030D6E0E3718ECBA42AA0B
                                  SHA-512:BDA59E97144FE871AAFD5916619EA807D76AC7194EA6324D33728BADCB61AE01AA67BE19EB9E99D187B0F0D9C3EC0BA5AEE6EF1AF80E39B151FAA8EF975EF243
                                  Malicious:false
                                  Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..@(.D...............................................................................................................................................................................................................................................................................................................................................xW.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.767432012023201
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                  • Win32 Executable (generic) a (10002005/4) 49.96%
                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:bpaymentcopy.exe
                                  File size:783'360 bytes
                                  MD5:5205be9a501dae770c6e557b5fdaeebc
                                  SHA1:a8a34796e05ac4ff1a0b92bdbbaedc01e8cedfa5
                                  SHA256:aca540b3ad20e1fd49ec550107eff0c164990de1067a9542daf615465f82c331
                                  SHA512:e7177c8f6562363751dedf374195ed0c59ba478530ba58e2428a62ba40fbae73c9dc9f55cdf8890779a9a848c53d6fedd7bdb9658e995df7331d8eea6a05170d
                                  SSDEEP:12288:LXNrylgwbJqMBSlxaZmvB008Jz1vakTLAJnElBaSP6XQ2lfix4phRDiaZEAmD:MgwkMYxcmUzgkTL2FSPd2ExQhJ
                                  TLSH:35F4F19972A1758DE863C6718D744D7056233DA9833B820B609F395F6BBF2439E207B3
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ifFg.............................`... ... ....@.. ....................................@................................
                                  Icon Hash:0fd88dc89ea7861b
                                  Entrypoint:0x4c600a
                                  Entrypoint Section:
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x67466669 [Wed Nov 27 00:23:05 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [004C6000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa23580x53.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x10ee8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xc40000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0xc60000x8
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0xa20000x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  V_cv5Ei0x20000x9e5500x9e600897f1e5e7b13fe005bf00094cd8317b7False1.0003175562352014data7.9997060342549515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .text0xa20000xf5b00xf60043f3f6f2592b49e2e2dc5ae689575496False0.32899834857723576data5.055454240221469IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xb20000x10ee80x11000bfa0907edb9a6e2a322fa5c96e2c9190False0.15221449908088236data3.8727140961072473IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xc40000xc0x200d7fa82ef30ede6d047e402cb61c2f9dcFalse0.044921875data0.09262353601004472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  0xc60000x100x200f7d3a249690ab70304b3da037c414aaaFalse0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0xb21300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/m0.14468236129184905
                                  RT_GROUP_ICON0xc29580x14data1.0
                                  RT_VERSION0xc296c0x390data0.3980263157894737
                                  RT_MANIFEST0xc2cfc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 2, 2024 11:30:07.712460041 CET49711587192.168.2.5207.204.50.48
                                  Dec 2, 2024 11:30:07.832611084 CET58749711207.204.50.48192.168.2.5
                                  Dec 2, 2024 11:30:07.832736015 CET49711587192.168.2.5207.204.50.48
                                  Dec 2, 2024 11:30:08.976697922 CET58749711207.204.50.48192.168.2.5
                                  Dec 2, 2024 11:30:09.051872015 CET49711587192.168.2.5207.204.50.48
                                  Dec 2, 2024 11:31:03.461826086 CET49711587192.168.2.5207.204.50.48
                                  Dec 2, 2024 11:31:03.581962109 CET58749711207.204.50.48192.168.2.5
                                  Dec 2, 2024 11:31:03.793986082 CET58749711207.204.50.48192.168.2.5
                                  Dec 2, 2024 11:31:03.848870039 CET49711587192.168.2.5207.204.50.48
                                  Dec 2, 2024 11:31:04.858228922 CET49711587192.168.2.5207.204.50.48
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 2, 2024 11:29:59.748068094 CET6076553192.168.2.51.1.1.1
                                  Dec 2, 2024 11:29:59.885968924 CET53607651.1.1.1192.168.2.5
                                  Dec 2, 2024 11:30:06.867222071 CET5328353192.168.2.51.1.1.1
                                  Dec 2, 2024 11:30:07.548091888 CET53532831.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Dec 2, 2024 11:29:59.748068094 CET192.168.2.51.1.1.10x4a03Standard query (0)75.103.13.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                  Dec 2, 2024 11:30:06.867222071 CET192.168.2.51.1.1.10xea08Standard query (0)mail.britishcrowncourt.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Dec 2, 2024 11:29:59.885968924 CET1.1.1.1192.168.2.50x4a03Name error (3)75.103.13.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                  Dec 2, 2024 11:30:07.548091888 CET1.1.1.1192.168.2.50xea08No error (0)mail.britishcrowncourt.net207.204.50.48A (IP address)IN (0x0001)false
                                  TimestampSource PortDest PortSource IPDest IPCommands
                                  Dec 2, 2024 11:30:08.976697922 CET58749711207.204.50.48192.168.2.5220 mailpod.hostingplatform.com ESMTP
                                  Dec 2, 2024 11:31:03.461826086 CET49711587192.168.2.5207.204.50.48EHLO 878411
                                  Dec 2, 2024 11:31:03.793986082 CET58749711207.204.50.48192.168.2.5250-mailpod.hostingplatform.com
                                  250-STARTTLS
                                  250-PIPELINING
                                  250-8BITMIME
                                  250-SIZE 65000000
                                  250 AUTH LOGIN PLAIN CRAM-MD5

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:05:29:53
                                  Start date:02/12/2024
                                  Path:C:\Users\user\Desktop\bpaymentcopy.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\bpaymentcopy.exe"
                                  Imagebase:0x560000
                                  File size:783'360 bytes
                                  MD5 hash:5205BE9A501DAE770C6E557B5FDAEEBC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:false

                                  Target ID:1
                                  Start time:05:29:53
                                  Start date:02/12/2024
                                  Path:C:\Users\user\Desktop\bpaymentcopy.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\bpaymentcopy.exe"
                                  Imagebase:0x110000
                                  File size:783'360 bytes
                                  MD5 hash:5205BE9A501DAE770C6E557B5FDAEEBC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:05:29:53
                                  Start date:02/12/2024
                                  Path:C:\Users\user\Desktop\bpaymentcopy.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\bpaymentcopy.exe"
                                  Imagebase:0x950000
                                  File size:783'360 bytes
                                  MD5 hash:5205BE9A501DAE770C6E557B5FDAEEBC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PredatorPainRAT, Description: Yara detected PredatorPainRAT, Source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: RAT_PredatorPain, Description: Detects PredatorPain RAT, Source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: PredatorPain, Description: unknown, Source: 00000002.00000002.2020474411.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low
                                  Has exited:true

                                  Target ID:5
                                  Start time:05:29:54
                                  Start date:02/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Windows Update.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Windows Update.exe"
                                  Imagebase:0xdd0000
                                  File size:783'360 bytes
                                  MD5 hash:5205BE9A501DAE770C6E557B5FDAEEBC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 74%, ReversingLabs
                                  Reputation:low
                                  Has exited:false

                                  Target ID:6
                                  Start time:05:29:55
                                  Start date:02/12/2024
                                  Path:C:\Users\user\AppData\Roaming\Windows Update.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\Windows Update.exe"
                                  Imagebase:0x510000
                                  File size:783'360 bytes
                                  MD5 hash:5205BE9A501DAE770C6E557B5FDAEEBC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000006.00000002.2712752940.0000000003A2F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000006.00000002.2712752940.00000000039B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PredatorPainRAT, Description: Yara detected PredatorPainRAT, Source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: RAT_PredatorPain, Description: Detects PredatorPain RAT, Source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: PredatorPain, Description: unknown, Source: 00000006.00000002.2709145607.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low
                                  Has exited:true

                                  Target ID:9
                                  Start time:05:30:07
                                  Start date:02/12/2024
                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 728 -s 2052
                                  Imagebase:0x410000
                                  File size:483'680 bytes
                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:12
                                  Start time:05:30:21
                                  Start date:02/12/2024
                                  Path:C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                                  Imagebase:0xf50000
                                  File size:783'360 bytes
                                  MD5 hash:5205BE9A501DAE770C6E557B5FDAEEBC
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PredatorPainRAT, Description: Yara detected PredatorPainRAT, Source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: RAT_PredatorPain, Description: Detects PredatorPain RAT, Source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: PredatorPain, Description: unknown, Source: 0000000C.00000002.3359110755.00000000041D9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 74%, ReversingLabs
                                  Reputation:low
                                  Has exited:false

                                  Target ID:13
                                  Start time:05:30:24
                                  Start date:02/12/2024
                                  Path:C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                                  Imagebase:0x360000
                                  File size:783'360 bytes
                                  MD5 hash:5205BE9A501DAE770C6E557B5FDAEEBC
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:14
                                  Start time:05:30:25
                                  Start date:02/12/2024
                                  Path:C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                                  Imagebase:0x7ff6068e0000
                                  File size:783'360 bytes
                                  MD5 hash:5205BE9A501DAE770C6E557B5FDAEEBC
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:15
                                  Start time:05:30:32
                                  Start date:02/12/2024
                                  Path:C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                                  Imagebase:0xa80000
                                  File size:783'360 bytes
                                  MD5 hash:5205BE9A501DAE770C6E557B5FDAEEBC
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PredatorPainRAT, Description: Yara detected PredatorPainRAT, Source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: RAT_PredatorPain, Description: Detects PredatorPain RAT, Source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  • Rule: PredatorPain, Description: unknown, Source: 0000000F.00000002.3362055770.0000000003F58000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                  Reputation:low
                                  Has exited:false

                                  Target ID:16
                                  Start time:05:30:39
                                  Start date:02/12/2024
                                  Path:C:\Users\user\AppData\Roaming\WindowsUpdate.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
                                  Imagebase:0x930000
                                  File size:783'360 bytes
                                  MD5 hash:5205BE9A501DAE770C6E557B5FDAEEBC
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:18
                                  Start time:05:31:03
                                  Start date:02/12/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                  Wow64 process (32bit):
                                  Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
                                  Imagebase:
                                  File size:1'173'928 bytes
                                  MD5 hash:D881DE17AA8F2E2C08CBB7B265F928F9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:false

                                  Target ID:20
                                  Start time:05:31:07
                                  Start date:02/12/2024
                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 1300
                                  Imagebase:0x410000
                                  File size:483'680 bytes
                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:18.5%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:7.1%
                                    Total number of Nodes:155
                                    Total number of Limit Nodes:3
                                    execution_graph 13237 1184ae8 13238 1184b0e LdrInitializeThunk 13237->13238 13240 1184e87 13238->13240 13241 4f90f6f 13243 4f900d0 13241->13243 13242 4f90eea 13242->13242 13243->13242 13260 118ec88 CreateProcessA 13243->13260 13261 118ec7d CreateProcessA 13243->13261 13244 4f9020c 13245 4f903f1 13244->13245 13268 118e868 Wow64SetThreadContext 13244->13268 13269 118e860 Wow64SetThreadContext 13244->13269 13262 118eae9 ReadProcessMemory 13245->13262 13263 118eaf0 ReadProcessMemory 13245->13263 13246 4f90561 13264 118e938 VirtualAllocEx 13246->13264 13265 118e940 VirtualAllocEx 13246->13265 13247 4f9077e 13252 118e9f8 WriteProcessMemory 13247->13252 13253 118ea00 WriteProcessMemory 13247->13253 13248 4f90bf0 13256 118e9f8 WriteProcessMemory 13248->13256 13257 118ea00 WriteProcessMemory 13248->13257 13249 4f90832 13249->13248 13266 118e9f8 WriteProcessMemory 13249->13266 13267 118ea00 WriteProcessMemory 13249->13267 13250 4f90c9a 13251 4f90e3a 13250->13251 13254 118e868 Wow64SetThreadContext 13250->13254 13255 118e860 Wow64SetThreadContext 13250->13255 13258 118e7b8 ResumeThread 13251->13258 13259 118e7b1 ResumeThread 13251->13259 13252->13249 13253->13249 13254->13251 13255->13251 13256->13250 13257->13250 13258->13242 13259->13242 13260->13244 13261->13244 13262->13246 13263->13246 13264->13247 13265->13247 13266->13249 13267->13249 13268->13245 13269->13245 13071 4f91071 13072 4f9107f 13071->13072 13074 4f900d0 13071->13074 13073 4f90eea 13073->13073 13074->13073 13101 118ec88 13074->13101 13105 118ec7d 13074->13105 13076 4f903f1 13118 118eae9 13076->13118 13122 118eaf0 13076->13122 13077 4f90561 13126 118e938 13077->13126 13130 118e940 13077->13130 13078 4f9077e 13134 118e9f8 13078->13134 13138 118ea00 13078->13138 13079 4f90bf0 13099 118e9f8 WriteProcessMemory 13079->13099 13100 118ea00 WriteProcessMemory 13079->13100 13080 4f90832 13080->13079 13091 118e9f8 WriteProcessMemory 13080->13091 13092 118ea00 WriteProcessMemory 13080->13092 13081 4f90c9a 13082 4f90e3a 13081->13082 13097 118e868 Wow64SetThreadContext 13081->13097 13098 118e860 Wow64SetThreadContext 13081->13098 13142 118e7b1 13082->13142 13146 118e7b8 13082->13146 13091->13080 13092->13080 13097->13082 13098->13082 13099->13081 13100->13081 13102 118ed11 CreateProcessA 13101->13102 13104 118eed3 13102->13104 13106 118ec15 13105->13106 13107 118ec87 CreateProcessA 13105->13107 13106->13076 13110 118e868 13106->13110 13114 118e860 13106->13114 13109 118eed3 13107->13109 13111 118e8ad Wow64SetThreadContext 13110->13111 13113 118e8f5 13111->13113 13113->13076 13115 118e8ad Wow64SetThreadContext 13114->13115 13117 118e8f5 13115->13117 13117->13076 13119 118eb3b ReadProcessMemory 13118->13119 13121 118eb7f 13119->13121 13121->13077 13123 118eb3b ReadProcessMemory 13122->13123 13125 118eb7f 13123->13125 13125->13077 13127 118e980 VirtualAllocEx 13126->13127 13129 118e9bd 13127->13129 13129->13078 13131 118e980 VirtualAllocEx 13130->13131 13133 118e9bd 13131->13133 13133->13078 13135 118ea48 WriteProcessMemory 13134->13135 13137 118ea9f 13135->13137 13137->13080 13139 118ea48 WriteProcessMemory 13138->13139 13141 118ea9f 13139->13141 13141->13080 13143 118e7f8 ResumeThread 13142->13143 13145 118e829 13143->13145 13145->13073 13147 118e7f8 ResumeThread 13146->13147 13149 118e829 13147->13149 13149->13073 13150 1188390 13151 118839c 13150->13151 13154 118bb20 13151->13154 13155 118bb4c 13154->13155 13161 118bbf8 13155->13161 13174 118bbf4 13155->13174 13187 118bf0f 13155->13187 13193 118bf4e 13155->13193 13156 11883ae 13163 118bc1a 13161->13163 13162 118bc68 13162->13156 13163->13162 13163->13163 13164 118bec3 13163->13164 13167 118be4c 13163->13167 13201 118d248 13163->13201 13205 118d241 13163->13205 13209 118a884 13164->13209 13166 118a884 CloseHandle 13166->13164 13167->13166 13168 118bf08 13168->13162 13213 118d5f0 13168->13213 13217 118d530 13168->13217 13221 118d528 13168->13221 13176 118bbf8 13174->13176 13175 118bc68 13175->13156 13175->13175 13176->13175 13177 118bec3 13176->13177 13180 118be4c 13176->13180 13182 118d248 CheckRemoteDebuggerPresent 13176->13182 13183 118d241 CheckRemoteDebuggerPresent 13176->13183 13178 118a884 CloseHandle 13177->13178 13181 118bf08 13178->13181 13179 118a884 CloseHandle 13179->13177 13180->13179 13180->13180 13181->13175 13184 118d528 EnumWindows 13181->13184 13185 118d530 EnumWindows 13181->13185 13186 118d5f0 EnumWindows 13181->13186 13182->13180 13183->13180 13184->13175 13185->13175 13186->13175 13188 118bf20 13187->13188 13189 118bf3d 13188->13189 13190 118d528 EnumWindows 13188->13190 13191 118d530 EnumWindows 13188->13191 13192 118d5f0 EnumWindows 13188->13192 13189->13156 13190->13189 13191->13189 13192->13189 13194 118becd 13193->13194 13195 118a884 CloseHandle 13194->13195 13197 118bf08 13195->13197 13196 118bf3d 13196->13156 13197->13196 13198 118d528 EnumWindows 13197->13198 13199 118d530 EnumWindows 13197->13199 13200 118d5f0 EnumWindows 13197->13200 13198->13196 13199->13196 13200->13196 13202 118d290 CheckRemoteDebuggerPresent 13201->13202 13204 118d2c5 13202->13204 13204->13167 13206 118d248 CheckRemoteDebuggerPresent 13205->13206 13208 118d2c5 13206->13208 13208->13167 13210 118d308 CloseHandle 13209->13210 13212 118d376 13210->13212 13212->13168 13214 118d58d EnumWindows 13213->13214 13216 118d5ff 13213->13216 13215 118d5b7 13214->13215 13215->13162 13216->13162 13218 118d571 EnumWindows 13217->13218 13220 118d5b7 13218->13220 13220->13162 13222 118d571 EnumWindows 13221->13222 13224 118d5b7 13222->13224 13224->13162 13225 1180850 13228 1180860 13225->13228 13226 1180859 13230 1180888 13228->13230 13229 1180d58 VirtualProtect 13231 1180d92 13229->13231 13230->13229 13232 1180c8e 13230->13232 13231->13226 13232->13226 13233 b2d01c 13234 b2d030 13233->13234 13235 b2d080 13234->13235 13236 118d5f0 EnumWindows 13234->13236 13236->13235

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 1184ae8-1184eb7 LdrInitializeThunk 44 1184eb9-1184ebe 0->44 45 1184f13-1184f25 0->45 46 1184ec2-1184ecd 44->46 56 1184f37-1187788 call 1187ee7 * 2 45->56 47 1184ecf-1184ed4 46->47 48 1184f27-1184f2c 46->48 50 1184eff-1184f06 47->50 51 1184ed6-1184edf 47->51 48->56 50->46 53 1184f08-1184f11 50->53 51->48 52 1184ee1-1184efd 51->52 52->53 53->44 53->45 550 118778e-11877d5 56->550 551 1187ecf-1187ed4 56->551 557 11877db-1187958 550->557 554 1187edf-1187ee6 551->554 582 118795f-118796a 557->582 584 1187979-118797d 582->584 585 118796c-1187977 582->585 586 1187983-1187992 584->586 587 1187e75-1187e77 584->587 585->584 597 11879d8-1187b18 586->597 598 1187994-11879a3 586->598 589 1187e79-1187e7d 587->589 590 1187e93-1187e95 587->590 589->590 591 1187e7f-1187e91 589->591 593 1187eab-1187eaf 590->593 594 1187e97-1187ea9 590->594 596 1187ec3-1187ec7 591->596 595 1187eb1-1187ebc 593->595 593->596 594->596 595->596 596->557 600 1187ecd 596->600 597->587 676 1187b1e-1187bc2 597->676 605 11879a9-11879b8 598->605 606 1187bc7-1187bcb 598->606 600->554 612 11879be-11879cd 605->612 613 1187c91-1187d5e 605->613 607 1187bd1-1187c72 606->607 608 1187c77-1187c7b 606->608 607->587 608->587 611 1187c81-1187c8c 608->611 611->587 621 1187d63-1187d67 612->621 622 11879d3 612->622 613->587 625 1187d6d-1187e44 621->625 626 1187e46-1187e6e 621->626 622->587 625->587 626->587 676->587
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: abcdefghijklmnopqrstuvwxyz1234567890$($($-$.$F$P V$U
                                    • API String ID: 2994545307-3984614173
                                    • Opcode ID: b84671594912ac99732c1985e1f25fe066c1f458a04bc8a258d66ba0b5ee189c
                                    • Instruction ID: 31b2c96a5fd03d00a0568059d1d930049b8ef574c64dc528eae788f0283dc16f
                                    • Opcode Fuzzy Hash: b84671594912ac99732c1985e1f25fe066c1f458a04bc8a258d66ba0b5ee189c
                                    • Instruction Fuzzy Hash: 6B532C74A402188FCB54DB69DD94B9DBBFABF88300F5085D9E809AB369DA305F84CF45

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 689 1184a57-1184a7c 691 1184adc-1184b08 689->691 692 1184a7e-1184a90 689->692 695 1184b0e-1184e5e 691->695 692->695 696 1184a92 692->696 734 1184e68-1184e7d LdrInitializeThunk 695->734 696->691 735 1184e87-1184eb7 734->735 739 1184eb9-1184ebe 735->739 740 1184f13-1184f25 735->740 741 1184ec2-1184ecd 739->741 751 1184f37-1184f3c 740->751 742 1184ecf-1184ed4 741->742 743 1184f27-1184f2c 741->743 745 1184eff-1184f06 742->745 746 1184ed6-1184edf 742->746 743->751 745->741 748 1184f08-1184f11 745->748 746->743 747 1184ee1-1184efd 746->747 747->748 748->739 748->740 753 1184f46-1184f6f 751->753 755 1184f79-1184fa5 call 1187ee7 753->755 756 1184fab-1184fb7 755->756 757 1184fc1-1184fcc call 1187ee7 756->757 758 1184fd2-1184fde 757->758 759 1184fe8-1184feb 758->759 760 1184ff3-1187788 759->760 1245 118778e-11877b8 760->1245 1246 1187ecf-1187ed4 760->1246 1251 11877c0-11877d5 1245->1251 1249 1187edf-1187ee6 1246->1249 1252 11877db-1187947 1251->1252 1275 1187951-1187958 1252->1275 1277 118795f-118796a 1275->1277 1279 1187979-118797d 1277->1279 1280 118796c-1187977 1277->1280 1281 1187983-1187992 1279->1281 1282 1187e75-1187e77 1279->1282 1280->1279 1292 11879d8-1187b18 1281->1292 1293 1187994-11879a3 1281->1293 1284 1187e79-1187e7d 1282->1284 1285 1187e93-1187e95 1282->1285 1284->1285 1286 1187e7f-1187e91 1284->1286 1288 1187eab-1187eaf 1285->1288 1289 1187e97-1187ea9 1285->1289 1291 1187ec3-1187ec7 1286->1291 1290 1187eb1-1187ebc 1288->1290 1288->1291 1289->1291 1290->1291 1291->1252 1295 1187ecd 1291->1295 1292->1282 1371 1187b1e-1187bc2 1292->1371 1300 11879a9-11879b8 1293->1300 1301 1187bc7-1187bcb 1293->1301 1295->1249 1307 11879be-11879cd 1300->1307 1308 1187c91-1187d5e 1300->1308 1302 1187bd1-1187c72 1301->1302 1303 1187c77-1187c7b 1301->1303 1302->1282 1303->1282 1306 1187c81-1187c8c 1303->1306 1306->1282 1316 1187d63-1187d67 1307->1316 1317 11879d3 1307->1317 1308->1282 1320 1187d6d-1187e44 1316->1320 1321 1187e46-1187e6e 1316->1321 1317->1282 1320->1282 1321->1282 1371->1282
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: abcdefghijklmnopqrstuvwxyz1234567890$($($-$.$F$P V$U
                                    • API String ID: 2994545307-3984614173
                                    • Opcode ID: 6d4703ae5ddb5d289e818f40c70c3da5daefedbae4179a93a1d529cd6c55afe5
                                    • Instruction ID: 11f585e986925d78ead163c48d5924d4d31a5aebc62a369a8be12fe2e24b74dc
                                    • Opcode Fuzzy Hash: 6d4703ae5ddb5d289e818f40c70c3da5daefedbae4179a93a1d529cd6c55afe5
                                    • Instruction Fuzzy Hash: 20430C74A402188FCB54DB69DD94B9DB7FABF88300F5485D9E809AB369DA306F84CF44

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1384 1184ad8-1184e5e 1424 1184e68-1184e7d LdrInitializeThunk 1384->1424 1425 1184e87-1184eb7 1424->1425 1429 1184eb9-1184ebe 1425->1429 1430 1184f13-1184f25 1425->1430 1431 1184ec2-1184ecd 1429->1431 1441 1184f37-1184f3c 1430->1441 1432 1184ecf-1184ed4 1431->1432 1433 1184f27-1184f2c 1431->1433 1435 1184eff-1184f06 1432->1435 1436 1184ed6-1184edf 1432->1436 1433->1441 1435->1431 1438 1184f08-1184f11 1435->1438 1436->1433 1437 1184ee1-1184efd 1436->1437 1437->1438 1438->1429 1438->1430 1443 1184f46-1184f6f 1441->1443 1445 1184f79-1184fa5 call 1187ee7 1443->1445 1446 1184fab-1184fb7 1445->1446 1447 1184fc1-1184fcc call 1187ee7 1446->1447 1448 1184fd2-1184fde 1447->1448 1449 1184fe8-1184feb 1448->1449 1450 1184ff3-1187788 1449->1450 1935 118778e-11877b8 1450->1935 1936 1187ecf-1187ed4 1450->1936 1941 11877c0-11877d5 1935->1941 1939 1187edf-1187ee6 1936->1939 1942 11877db-1187947 1941->1942 1965 1187951-1187958 1942->1965 1967 118795f-118796a 1965->1967 1969 1187979-118797d 1967->1969 1970 118796c-1187977 1967->1970 1971 1187983-1187992 1969->1971 1972 1187e75-1187e77 1969->1972 1970->1969 1982 11879d8-1187b18 1971->1982 1983 1187994-11879a3 1971->1983 1974 1187e79-1187e7d 1972->1974 1975 1187e93-1187e95 1972->1975 1974->1975 1976 1187e7f-1187e91 1974->1976 1978 1187eab-1187eaf 1975->1978 1979 1187e97-1187ea9 1975->1979 1981 1187ec3-1187ec7 1976->1981 1980 1187eb1-1187ebc 1978->1980 1978->1981 1979->1981 1980->1981 1981->1942 1985 1187ecd 1981->1985 1982->1972 2061 1187b1e-1187bc2 1982->2061 1990 11879a9-11879b8 1983->1990 1991 1187bc7-1187bcb 1983->1991 1985->1939 1997 11879be-11879cd 1990->1997 1998 1187c91-1187d5e 1990->1998 1992 1187bd1-1187c72 1991->1992 1993 1187c77-1187c7b 1991->1993 1992->1972 1993->1972 1996 1187c81-1187c8c 1993->1996 1996->1972 2006 1187d63-1187d67 1997->2006 2007 11879d3 1997->2007 1998->1972 2010 1187d6d-1187e44 2006->2010 2011 1187e46-1187e6e 2006->2011 2007->1972 2010->1972 2011->1972 2061->1972
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: abcdefghijklmnopqrstuvwxyz1234567890$($($-$.$F$P V$U
                                    • API String ID: 2994545307-3984614173
                                    • Opcode ID: 667fe0d3e7e861402707fe475a56348b3099397b2e4955112a9320e9ceda02ec
                                    • Instruction ID: 91082a73cd9c9fa76116c990f424b8678c8a0e7d978eed16f8e498ecce4220cc
                                    • Opcode Fuzzy Hash: 667fe0d3e7e861402707fe475a56348b3099397b2e4955112a9320e9ceda02ec
                                    • Instruction Fuzzy Hash: 1B430B74A402188FCB54DB69DD94B9DB7FABF88300F5485D9E809AB369DA306F84CF44

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2074 1180860-11808a1 2078 11808ba 2074->2078 2079 11808a3-11808a7 2074->2079 2082 11808bc-1180907 2078->2082 2080 11808ad-11808b8 2079->2080 2081 1180cf3-1180d90 VirtualProtect 2079->2081 2080->2082 2096 1180d99-1180dba 2081->2096 2097 1180d92-1180d98 2081->2097 2086 118090d-1180921 2082->2086 2087 11809b2-11809dd 2082->2087 2088 118094e-1180950 2086->2088 2089 1180923-1180927 2086->2089 2108 11809e0-11809e8 2087->2108 2091 11809a0-11809ac 2088->2091 2092 1180952-1180956 2088->2092 2094 1180929-118092c 2089->2094 2095 118092e 2089->2095 2091->2086 2091->2087 2098 1180958-118095b 2092->2098 2099 118095d 2092->2099 2100 1180931-118093d 2094->2100 2095->2100 2097->2096 2103 1180960-1180978 2098->2103 2099->2103 2101 118093f-1180941 2100->2101 2102 1180943 2100->2102 2105 1180946-118094c 2101->2105 2102->2105 2103->2091 2107 118097a-118099e 2103->2107 2105->2091 2107->2091 2107->2107 2108->2081 2109 11809ee-11809fd 2108->2109 2109->2081 2110 1180a03-1180a3d 2109->2110 2110->2108 2111 1180a3f-1180a48 2110->2111 2111->2081 2112 1180a4e-1180a5d 2111->2112 2112->2081 2113 1180a63-1180a6f 2112->2113 2113->2081 2114 1180a75-1180a81 2113->2114 2114->2081 2115 1180a87-1180a94 2114->2115 2115->2081 2116 1180a9a-1180aa3 2115->2116 2116->2081 2117 1180aa9-1180ab5 2116->2117 2117->2081 2118 1180abb-1180ac4 2117->2118 2118->2081 2119 1180aca-1180ad6 2118->2119 2119->2081 2120 1180adc-1180ae5 2119->2120 2120->2081 2121 1180aeb-1180af8 2120->2121 2121->2081 2122 1180afe-1180b07 2121->2122 2122->2081 2123 1180b0d-1180b19 2122->2123 2123->2081 2124 1180b1f-1180b28 2123->2124 2124->2081 2125 1180b2e-1180b3a 2124->2125 2125->2081 2126 1180b40-1180b49 2125->2126 2126->2081 2127 1180b4f-1180b5c 2126->2127 2127->2081 2128 1180b62-1180b6b 2127->2128 2128->2081 2129 1180b71-1180b7d 2128->2129 2129->2081 2130 1180b83-1180b8c 2129->2130 2130->2081 2131 1180b92-1180b9e 2130->2131 2131->2081 2132 1180ba4-1180bad 2131->2132 2132->2081 2133 1180bb3-1180bc0 2132->2133 2133->2081 2134 1180bc6-1180bcf 2133->2134 2134->2081 2135 1180bd5-1180be1 2134->2135 2135->2081 2136 1180be7-1180bf0 2135->2136 2136->2081 2137 1180bf6-1180c02 2136->2137 2137->2081 2138 1180c08-1180c11 2137->2138 2138->2081 2139 1180c17-1180c24 2138->2139 2139->2081 2140 1180c2a-1180c33 2139->2140 2140->2081 2141 1180c39-1180c45 2140->2141 2141->2081 2142 1180c4b-1180c54 2141->2142 2142->2081 2143 1180c5a-1180c63 2142->2143 2143->2081 2144 1180c69-1180c83 call 1180464 2143->2144 2146 1180c88-1180c8c 2144->2146 2147 1180c8e-1180c95 2146->2147 2148 1180c96-1180c9e 2146->2148 2149 1180ceb-1180cf2 2148->2149 2150 1180ca0 2148->2150 2151 1180ca3-1180cad 2150->2151 2151->2081 2152 1180caf-1180cc8 2151->2152 2152->2081 2153 1180cca-1180cde 2152->2153 2153->2081 2154 1180ce0-1180ce9 2153->2154 2154->2149 2154->2151
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01180D83
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: @
                                    • API String ID: 544645111-2766056989
                                    • Opcode ID: a3bbd00f84bdc2915b5a86e37d6792818f5199be594956d1df8a576b657e30e8
                                    • Instruction ID: 426c0c051a5d7e7d1efeb838764ba4aef002f027bc3b295831b58a601ac8a657
                                    • Opcode Fuzzy Hash: a3bbd00f84bdc2915b5a86e37d6792818f5199be594956d1df8a576b657e30e8
                                    • Instruction Fuzzy Hash: 20020370E002099FDB58DF98C591AADBBB2FF49210F64819AE819EB205D374ED85CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2183 11889f0-1188a1b 2185 1188a1d 2183->2185 2186 1188a22-1188ac6 2183->2186 2185->2186 2189 1188ac8-1188acf 2186->2189 2190 1188b2a-1188b7e 2186->2190 2189->2189 2191 1188ad1-1188ad6 2189->2191 2200 1188b84-1188bdd 2190->2200 2192 1188ae8-1188b28 2191->2192 2193 1188ad8-1188ae2 2191->2193 2192->2200 2193->2192 2204 118916f-118918b 2200->2204 2206 1189191-1189198 2204->2206 2207 1188be2-1188bee 2204->2207 2206->2206 2208 118919a-11891a1 2206->2208 2209 1188bf0 2207->2209 2210 1188bf5-1188c14 2207->2210 2209->2210 2212 1188c5e-1188cdc 2210->2212 2213 1188c16-1188c1d 2210->2213 2225 1188d3e-1188d76 2212->2225 2226 1188cde-1188ce5 2212->2226 2213->2213 2214 1188c1f-1188c59 2213->2214 2219 1189147-118916c 2214->2219 2219->2204 2232 1188d7e-1188d86 2225->2232 2226->2226 2227 1188ce7-1188d3c 2226->2227 2227->2232 2234 1188dd8-1188dde 2232->2234 2235 1188d88-1188da7 2234->2235 2236 1188de0-1188de7 2234->2236 2238 1188da9 2235->2238 2239 1188dae-1188dd5 2235->2239 2236->2236 2237 1188de9-1188ead 2236->2237 2248 1188eaf-1188eb6 2237->2248 2249 1188ef7-1188efb 2237->2249 2238->2239 2239->2234 2248->2248 2250 1188eb8-1188ef1 2248->2250 2251 1188efd-1188f04 2249->2251 2252 1188f45-1188f49 2249->2252 2250->2249 2251->2251 2253 1188f06-1188f3f 2251->2253 2254 1188f4b-1188f52 2252->2254 2255 1188f93-1188f97 2252->2255 2253->2252 2254->2254 2256 1188f54-1188f8d 2254->2256 2257 1188f99-1188fa0 2255->2257 2258 1189002-118902f 2255->2258 2256->2255 2257->2257 2260 1188fa2-1188faa 2257->2260 2265 118907b-11890a5 2258->2265 2266 1189031-1189044 2258->2266 2264 1188ff1-1188ff7 2260->2264 2267 1188ff9-1189000 2264->2267 2268 1188fac-1188fee 2264->2268 2273 11890ae-118912d 2265->2273 2266->2266 2269 1189046-1189079 2266->2269 2267->2258 2267->2267 2268->2264 2269->2273 2278 1189134-1189141 2273->2278 2278->2219
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: pnq
                                    • API String ID: 0-1150273632
                                    • Opcode ID: da5c33cb7103dda352b213ba596e14539e07351d9228802a972c1dc7125da2ca
                                    • Instruction ID: e20ecf1f44e6f0b746d04df02c150bcc3cfeac351040c1118764c35b2d9400b0
                                    • Opcode Fuzzy Hash: da5c33cb7103dda352b213ba596e14539e07351d9228802a972c1dc7125da2ca
                                    • Instruction Fuzzy Hash: 5B32E275A00218DFDB29DF68C944E99BBB2FF49304F1580E9E609AB361DB319E91CF50
                                    APIs
                                    • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0118D2B6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: 68b074e940dc151a2aa7d224692be285b77ee9ee03cd66e30bffc30e842ec55a
                                    • Instruction ID: a1bc6bb1c9ca3af7c77e3df06b7c61aba0e4441a3733ec2d8ce65de43edf7082
                                    • Opcode Fuzzy Hash: 68b074e940dc151a2aa7d224692be285b77ee9ee03cd66e30bffc30e842ec55a
                                    • Instruction Fuzzy Hash: 0411E7B1D003098EDB14DFAAC5456AEFBF5EF49320F54842AD519A7250CB78A944CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3366023228.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 731b6e78d74903c87ca0c85b0fc07170cdc8085147cdf4f5d20d07376e596573
                                    • Instruction ID: c6d3555653e17e93133ae0225e86638d9bebfbb6e80a7d5fcc6bcfd82abcb925
                                    • Opcode Fuzzy Hash: 731b6e78d74903c87ca0c85b0fc07170cdc8085147cdf4f5d20d07376e596573
                                    • Instruction Fuzzy Hash: CE927D74E01229CFEB64DF69C984BDDBBB1AB59314F1081EAA90DA7251DB309E81CF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b27d11b2d1f07a77909a4a519ba7d10d6f8af2986d7a065a5ca2974efc0f4814
                                    • Instruction ID: dc37ae39e08000aed12fe8e9956c1f76fa3bec1ee4f25c659b30ff78a86f5108
                                    • Opcode Fuzzy Hash: b27d11b2d1f07a77909a4a519ba7d10d6f8af2986d7a065a5ca2974efc0f4814
                                    • Instruction Fuzzy Hash: 0542A678E44229CBDB68DF69D984BDDBBB2BF49300F1095A9D909A7390DB705E81CF10
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 87ce8c0e61f613ade995e527fe8ee478fa93174dca7e3508a4dd5c6a39031bd7
                                    • Instruction ID: e4ee30025dd6bafa8c8887a958085e1e18bcb67b10735ee947fdbd96f1508375
                                    • Opcode Fuzzy Hash: 87ce8c0e61f613ade995e527fe8ee478fa93174dca7e3508a4dd5c6a39031bd7
                                    • Instruction Fuzzy Hash: 55613A75E052588FDB19CF6AD840AC9FBB2EF99300F54C1EAD409AB265EB305A85CF11

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2279 118ec7d-118ec85 2280 118ec15-118ec42 2279->2280 2281 118ec87-118ed1d 2279->2281 2289 118ec4b-118ec70 2280->2289 2290 118ec44-118ec4a 2280->2290 2284 118ed1f-118ed29 2281->2284 2285 118ed56-118ed76 2281->2285 2284->2285 2287 118ed2b-118ed2d 2284->2287 2293 118ed78-118ed82 2285->2293 2294 118edaf-118edde 2285->2294 2291 118ed2f-118ed39 2287->2291 2292 118ed50-118ed53 2287->2292 2290->2289 2295 118ed3b 2291->2295 2296 118ed3d-118ed4c 2291->2296 2292->2285 2293->2294 2297 118ed84-118ed86 2293->2297 2307 118ede0-118edea 2294->2307 2308 118ee17-118eed1 CreateProcessA 2294->2308 2295->2296 2296->2296 2300 118ed4e 2296->2300 2301 118ed88-118ed92 2297->2301 2302 118eda9-118edac 2297->2302 2300->2292 2304 118ed94 2301->2304 2305 118ed96-118eda5 2301->2305 2302->2294 2304->2305 2305->2305 2309 118eda7 2305->2309 2307->2308 2310 118edec-118edee 2307->2310 2319 118eeda-118ef60 2308->2319 2320 118eed3-118eed9 2308->2320 2309->2302 2312 118edf0-118edfa 2310->2312 2313 118ee11-118ee14 2310->2313 2314 118edfc 2312->2314 2315 118edfe-118ee0d 2312->2315 2313->2308 2314->2315 2315->2315 2316 118ee0f 2315->2316 2316->2313 2330 118ef70-118ef74 2319->2330 2331 118ef62-118ef66 2319->2331 2320->2319 2332 118ef84-118ef88 2330->2332 2333 118ef76-118ef7a 2330->2333 2331->2330 2334 118ef68-118ef6b call 11880a8 2331->2334 2336 118ef98-118ef9c 2332->2336 2337 118ef8a-118ef8e 2332->2337 2333->2332 2335 118ef7c-118ef7f call 11880a8 2333->2335 2334->2330 2335->2332 2341 118efae-118efb5 2336->2341 2342 118ef9e-118efa4 2336->2342 2337->2336 2340 118ef90-118ef93 call 11880a8 2337->2340 2340->2336 2344 118efcc 2341->2344 2345 118efb7-118efc6 2341->2345 2342->2341 2346 118efcd 2344->2346 2345->2344 2346->2346
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0118EEBE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: d91a642ceabdc22f31a5cef4720c56ce93813bf0f951be775202d7b3a67e0294
                                    • Instruction ID: 69fe15be53c167a4e528662a55daa9f7c6f806830bf74a62b9b15385c17decd5
                                    • Opcode Fuzzy Hash: d91a642ceabdc22f31a5cef4720c56ce93813bf0f951be775202d7b3a67e0294
                                    • Instruction Fuzzy Hash: 6BB18C71D01219CFEB24EFACC8407EEBBB2BF49310F148569E819A7290DB749985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2348 118ec88-118ed1d 2350 118ed1f-118ed29 2348->2350 2351 118ed56-118ed76 2348->2351 2350->2351 2352 118ed2b-118ed2d 2350->2352 2356 118ed78-118ed82 2351->2356 2357 118edaf-118edde 2351->2357 2354 118ed2f-118ed39 2352->2354 2355 118ed50-118ed53 2352->2355 2358 118ed3b 2354->2358 2359 118ed3d-118ed4c 2354->2359 2355->2351 2356->2357 2360 118ed84-118ed86 2356->2360 2367 118ede0-118edea 2357->2367 2368 118ee17-118eed1 CreateProcessA 2357->2368 2358->2359 2359->2359 2361 118ed4e 2359->2361 2362 118ed88-118ed92 2360->2362 2363 118eda9-118edac 2360->2363 2361->2355 2365 118ed94 2362->2365 2366 118ed96-118eda5 2362->2366 2363->2357 2365->2366 2366->2366 2369 118eda7 2366->2369 2367->2368 2370 118edec-118edee 2367->2370 2379 118eeda-118ef60 2368->2379 2380 118eed3-118eed9 2368->2380 2369->2363 2372 118edf0-118edfa 2370->2372 2373 118ee11-118ee14 2370->2373 2374 118edfc 2372->2374 2375 118edfe-118ee0d 2372->2375 2373->2368 2374->2375 2375->2375 2376 118ee0f 2375->2376 2376->2373 2390 118ef70-118ef74 2379->2390 2391 118ef62-118ef66 2379->2391 2380->2379 2392 118ef84-118ef88 2390->2392 2393 118ef76-118ef7a 2390->2393 2391->2390 2394 118ef68-118ef6b call 11880a8 2391->2394 2396 118ef98-118ef9c 2392->2396 2397 118ef8a-118ef8e 2392->2397 2393->2392 2395 118ef7c-118ef7f call 11880a8 2393->2395 2394->2390 2395->2392 2401 118efae-118efb5 2396->2401 2402 118ef9e-118efa4 2396->2402 2397->2396 2400 118ef90-118ef93 call 11880a8 2397->2400 2400->2396 2404 118efcc 2401->2404 2405 118efb7-118efc6 2401->2405 2402->2401 2406 118efcd 2404->2406 2405->2404 2406->2406
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0118EEBE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 9d449e45a2be36b7da66b16e7a7a17bd0b80192b9b7ea985735d2430b0b0dc56
                                    • Instruction ID: d79966434711a4028f883f0ba7978307f22f1a884ef70a7497817b8c9557bc02
                                    • Opcode Fuzzy Hash: 9d449e45a2be36b7da66b16e7a7a17bd0b80192b9b7ea985735d2430b0b0dc56
                                    • Instruction Fuzzy Hash: F4917C71D01219DFEB28EF6CC8407DDBBB2BF49310F1485A9E819A7290DB749985CF92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2408 118d5f0-118d5fd 2409 118d58d-118d5b5 EnumWindows 2408->2409 2410 118d5ff-118d625 2408->2410 2413 118d5be-118d5eb 2409->2413 2414 118d5b7-118d5bd 2409->2414 2411 118d62c-118d6a7 call 118cf50 * 2 call 118c8c0 call 118d818 2410->2411 2412 118d627 2410->2412 2427 118d6ad-118d6d1 call 118cf50 2411->2427 2412->2411 2414->2413 2430 118d783-118d79b call 118c808 2427->2430 2433 118d7a1-118d7a8 2430->2433 2434 118d6d6-118d6df 2430->2434 2433->2433 2437 118d7aa-118d7c0 call 118cf50 2433->2437 2435 118d6e1 2434->2435 2436 118d6e6-118d71d call 118cf50 2434->2436 2435->2436 2443 118d71f-118d726 2436->2443 2444 118d767-118d780 call 118cf50 2436->2444 2443->2443 2446 118d728-118d72d 2443->2446 2444->2430 2448 118d73c-118d7ca call 118cf50 * 2 2446->2448 2449 118d72f-118d739 2446->2449 2449->2448
                                    APIs
                                    • EnumWindows.USER32(00000000,?), ref: 0118D5A8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: EnumWindows
                                    • String ID:
                                    • API String ID: 1129996299-0
                                    • Opcode ID: d6a46a0c7242c3fdb17041e50c6fb7e1d0655ce3ce4084f605f27cd2af6728fc
                                    • Instruction ID: 09c21278f5f2ff6ae42687cceb1377eda8f3c581ca48448607774e9d5ac6434b
                                    • Opcode Fuzzy Hash: d6a46a0c7242c3fdb17041e50c6fb7e1d0655ce3ce4084f605f27cd2af6728fc
                                    • Instruction Fuzzy Hash: 0D51E275E002198FDF08EFEAD8446DEBBF2AF99314F10C02AD519AB294DB345945CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2457 118e9f8-118ea4e 2459 118ea5e-118ea9d WriteProcessMemory 2457->2459 2460 118ea50-118ea5c 2457->2460 2462 118ea9f-118eaa5 2459->2462 2463 118eaa6-118ead6 2459->2463 2460->2459 2462->2463
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0118EA90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 61ece0c7470327d228a44ebb6c0f25c32d4152a2f42bab0c5ddafe04be2e68e0
                                    • Instruction ID: 9cd764bf48ad14daf8df539850bc7b82c41adb8c8cbbc40f858132cbcb501890
                                    • Opcode Fuzzy Hash: 61ece0c7470327d228a44ebb6c0f25c32d4152a2f42bab0c5ddafe04be2e68e0
                                    • Instruction Fuzzy Hash: E32146B19003099FDB24DFAAC881BEEBBF5FF48310F10842AE919A7250C7789545CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2467 118ea00-118ea4e 2469 118ea5e-118ea9d WriteProcessMemory 2467->2469 2470 118ea50-118ea5c 2467->2470 2472 118ea9f-118eaa5 2469->2472 2473 118eaa6-118ead6 2469->2473 2470->2469 2472->2473
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0118EA90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 078d6fa992d32cf80778dedc91999cd3f38d6c983000b13dba313aee2b9da778
                                    • Instruction ID: d83a61ca02c083a00e8d6cbf692fdd56b75271b026f583848dbcc126961c7dab
                                    • Opcode Fuzzy Hash: 078d6fa992d32cf80778dedc91999cd3f38d6c983000b13dba313aee2b9da778
                                    • Instruction Fuzzy Hash: E42127B19003099FDB14DFAAC885BEEBBF5FF48310F10842AE919A7250D7789944CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2477 118e860-118e8b3 2479 118e8c3-118e8f3 Wow64SetThreadContext 2477->2479 2480 118e8b5-118e8c1 2477->2480 2482 118e8fc-118e92c 2479->2482 2483 118e8f5-118e8fb 2479->2483 2480->2479 2483->2482
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0118E8E6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 7978b58cb2864406900fc3e120b666eac578096b95d75fe706eef2ad44f130e4
                                    • Instruction ID: a4961746e716ad57e4c355ece1d847a6e5939ee969c0150e0f595f316a338444
                                    • Opcode Fuzzy Hash: 7978b58cb2864406900fc3e120b666eac578096b95d75fe706eef2ad44f130e4
                                    • Instruction Fuzzy Hash: AC2137B1D002098FDB54DFAAC5857EEBBF4EF49310F54842AD559A7240CB789585CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2487 118eae9-118eb7d ReadProcessMemory 2490 118eb7f-118eb85 2487->2490 2491 118eb86-118ebb6 2487->2491 2490->2491
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0118EB70
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: dd66ef0e2721c50398455895be14e0494c16b13ad380c114c429a8d9972a0d37
                                    • Instruction ID: 6aef71aecadd2ee9f96fc1950417227a27a5cd06a7acab66641e7fd1836ac02c
                                    • Opcode Fuzzy Hash: dd66ef0e2721c50398455895be14e0494c16b13ad380c114c429a8d9972a0d37
                                    • Instruction Fuzzy Hash: A52145B1C002499FDB20DFAAC885AEEFBF5FF48310F10842AE559A3250C7789544CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2495 118e868-118e8b3 2497 118e8c3-118e8f3 Wow64SetThreadContext 2495->2497 2498 118e8b5-118e8c1 2495->2498 2500 118e8fc-118e92c 2497->2500 2501 118e8f5-118e8fb 2497->2501 2498->2497 2501->2500
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0118E8E6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 030bd74b35b3a000ad188ea40e6c73bce7d3c089a99c9cb16575e00bb3d28b17
                                    • Instruction ID: 9a8eace56e00d307fbc475a4ad370d075c954b23be7a83e5e1223c21f34c0f93
                                    • Opcode Fuzzy Hash: 030bd74b35b3a000ad188ea40e6c73bce7d3c089a99c9cb16575e00bb3d28b17
                                    • Instruction Fuzzy Hash: AB2138B1D003098FDB14DFAAC4857AEBBF4EF49310F54C42AD519A7240CB78A944CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2505 118eaf0-118eb7d ReadProcessMemory 2508 118eb7f-118eb85 2505->2508 2509 118eb86-118ebb6 2505->2509 2508->2509
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0118EB70
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 45f21e602be151b7d9ab35a11268e1576bb42e333e3f7c87be86cf930d5ef44a
                                    • Instruction ID: ea69f4739af1a21df095677a77b529282159697c57c56b7f53045d783d14cba2
                                    • Opcode Fuzzy Hash: 45f21e602be151b7d9ab35a11268e1576bb42e333e3f7c87be86cf930d5ef44a
                                    • Instruction Fuzzy Hash: E32128B1C003499FCB10DFAAC841AEEBBF5FF48310F50842AE519A7250C7789540CBA0
                                    APIs
                                    • EnumWindows.USER32(00000000,?), ref: 0118D5A8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: EnumWindows
                                    • String ID:
                                    • API String ID: 1129996299-0
                                    • Opcode ID: 7c573939e6716ff7c84c981c1434d74a3a3659c51aa72dd142c399179515aed8
                                    • Instruction ID: 731240a77fa52f6a53c915a175d150f11cf031735e0f23872ccef7fd94c4b51a
                                    • Opcode Fuzzy Hash: 7c573939e6716ff7c84c981c1434d74a3a3659c51aa72dd142c399179515aed8
                                    • Instruction Fuzzy Hash: A82137B1D042098FDB14DFAAC9457EEBBF5AF88310F14842AD419A7290CB799945CFA0
                                    APIs
                                    • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0118D2B6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: 1dcf7c1add6cb5e12a06815bedf391050a0ecc50d77124488d811f841ab857eb
                                    • Instruction ID: 1326113b553a87d97c9d903a1f6d6acfa79f87581f718c8ac2c00693fb99c5fb
                                    • Opcode Fuzzy Hash: 1dcf7c1add6cb5e12a06815bedf391050a0ecc50d77124488d811f841ab857eb
                                    • Instruction Fuzzy Hash: 6C21F7B1D003098FDB14DFAAC484A9EFBF5FF49320F54842AD419A7250DB78A944CFA1
                                    APIs
                                    • EnumWindows.USER32(00000000,?), ref: 0118D5A8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: EnumWindows
                                    • String ID:
                                    • API String ID: 1129996299-0
                                    • Opcode ID: 9b991830b135275f68eb8337fe6b23fd90d08b303d929e041bed2d2d7b732410
                                    • Instruction ID: 7c52d178f5fbc5bbc53ffe6fbdcf05816bfc910f37e8bb94fb8d11766815ffd4
                                    • Opcode Fuzzy Hash: 9b991830b135275f68eb8337fe6b23fd90d08b303d929e041bed2d2d7b732410
                                    • Instruction Fuzzy Hash: D72115B1D002098FDB14DFAAC9457AEBBF5AF88310F14842AD415A7290CB79A945CFA1
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0118E9AE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 27216614a849d4a310f63a727dbbaaa5c9884fdbcbd760f4b92932e2ccabdd93
                                    • Instruction ID: fb78a4cbbbbc419e92972d47c093bbd35e88647325dec31033214204be909728
                                    • Opcode Fuzzy Hash: 27216614a849d4a310f63a727dbbaaa5c9884fdbcbd760f4b92932e2ccabdd93
                                    • Instruction Fuzzy Hash: 47115971D002499FDB24DFAAC8456EEBFF5EF88320F108419E559A7250C7799545CFA0
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01180D83
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 8581ab4e71669a7dc27bb8285f67e8d49216727e7abeb4172bd5e851446ea1ba
                                    • Instruction ID: 66ad04d5085f6abe8634a649136215a2b5faa9b36337855447517003014820c9
                                    • Opcode Fuzzy Hash: 8581ab4e71669a7dc27bb8285f67e8d49216727e7abeb4172bd5e851446ea1ba
                                    • Instruction Fuzzy Hash: 2621E4B59002499FCB10DF9AC584BDEFBF9FF48320F10842AE958A7250D378A644CFA1
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0118E9AE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 1fa715bb8700933f6b515aa0aac4ac435e3dffefe0e7590c1bcab38bc6055df7
                                    • Instruction ID: 48b6a7478bb7e735734cfd51cf3a88f7eb12eae212410a52ad0ba523108c5b94
                                    • Opcode Fuzzy Hash: 1fa715bb8700933f6b515aa0aac4ac435e3dffefe0e7590c1bcab38bc6055df7
                                    • Instruction Fuzzy Hash: 90114971D002499FCB14DFAAC845AEFBFF5EF88320F148419E519A7250CB79A550CFA1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: aa7de17e23db7153919aca4b70cbaf519904c671b06b0d917ed5bd4e0e98e99d
                                    • Instruction ID: 9ffca3c92bb8becd9296f233e1dad2f3d04704fbd293c5fa0055c1590894504b
                                    • Opcode Fuzzy Hash: aa7de17e23db7153919aca4b70cbaf519904c671b06b0d917ed5bd4e0e98e99d
                                    • Instruction Fuzzy Hash: F91146B1D002498FDB24DFAAC4457EEFBF4EF88320F14841AD519A7650C778A585CF94
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 77b8e27da09d5b16857ce3a6d9b7e30b82e2e9d46b1362072a5ce66dc14b5274
                                    • Instruction ID: ef49d23626688e118e93fb4e3059068ecb346418bc6d616e958a07954ff3eff9
                                    • Opcode Fuzzy Hash: 77b8e27da09d5b16857ce3a6d9b7e30b82e2e9d46b1362072a5ce66dc14b5274
                                    • Instruction Fuzzy Hash: 01113AB1D003488FDB24DFAAC4457AEFBF5EF89320F148419D519A7250CB79A544CFA4
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0118D367
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 88fa613df03b510abea1af6c6cb5b512be7aa477c3e92effd6efef9655c0fb10
                                    • Instruction ID: 9804e5274fc5d3589450330ee646518e92d8e66a94f5369ad7cdbac6a8657ebe
                                    • Opcode Fuzzy Hash: 88fa613df03b510abea1af6c6cb5b512be7aa477c3e92effd6efef9655c0fb10
                                    • Instruction Fuzzy Hash: 0D1106B5804349CFCB14DF9AD544B9EFBF4EB49310F10845AD519A7250C774A944CFA5
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0118D367
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: dde8eafa549d73f0487dd0571a2adadcf2fe2582c0ae96719f1b3de2c8cec21d
                                    • Instruction ID: ab30cb60baf5da6434471f861477b731c7aa5984d7df97ea4f6d90ef1e9430b4
                                    • Opcode Fuzzy Hash: dde8eafa549d73f0487dd0571a2adadcf2fe2582c0ae96719f1b3de2c8cec21d
                                    • Instruction Fuzzy Hash: 0711F2B5904249CFCB10DF9AE484BEEBBF4EF49714F20845AD518A7650C378A944CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3338885396.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_b2d000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 01806b6580733fc10f8f7e0a2da23294ae0baf6d9626b84d93662831100ee1c6
                                    • Instruction ID: d37a0b82ddca90383e7c6ed07b5f44b8386072fc65463e578a6d7f03fd1078a0
                                    • Opcode Fuzzy Hash: 01806b6580733fc10f8f7e0a2da23294ae0baf6d9626b84d93662831100ee1c6
                                    • Instruction Fuzzy Hash: E02101716042409FCB14DF24E5D4F27BBA5FB88714F20C6ADE90D4B2A5C33AD807C662
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3338885396.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_b2d000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f0ff6b08069e97fd05f33cc3a50cabfcbae37e6b7b199a96b6475edea31890ad
                                    • Instruction ID: b74cd9663c668599b8d0ba8d0e309bc954c10dae5e45b9aec542610d66c3cd19
                                    • Opcode Fuzzy Hash: f0ff6b08069e97fd05f33cc3a50cabfcbae37e6b7b199a96b6475edea31890ad
                                    • Instruction Fuzzy Hash: C721C3755083C08FC702CF20D594715BFB1FB46314F28C5EAD8498B6A3C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3366023228.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cbf36eeafa6efe46eb5dd578733a4d25f618426394b2774b379405250b68b778
                                    • Instruction ID: 365dec7528d25e19e1739aef07e55bf739c935f10f67699a09f4342934267ef9
                                    • Opcode Fuzzy Hash: cbf36eeafa6efe46eb5dd578733a4d25f618426394b2774b379405250b68b778
                                    • Instruction Fuzzy Hash: 6F119D78E01228CFEFA0DF64D848BD9B7B0AB59311F0094A9D50DA7250DB345A848F51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3366023228.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 492c7b17fd3ad426154bb7880ef1fd999716c81eff310573d9fb41825fdce1b1
                                    • Instruction ID: 5020bd957b22a2a16b934abbe3f63b60c6e27f1f30c834f154d5bdf140f2e16f
                                    • Opcode Fuzzy Hash: 492c7b17fd3ad426154bb7880ef1fd999716c81eff310573d9fb41825fdce1b1
                                    • Instruction Fuzzy Hash: 03F0A734A442446FEB09DB98D890AA8BF72DB55318F2482EA98059B3D3D6329943DB45
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3342795684.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2910000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c468d1216cde06419113a54099f6d5c6cf0f2a208495e8b92ad19b3780d130a6
                                    • Instruction ID: 1fbc15a3b344beb117eeec78b8e43c162c4aff0d246d8eea3c80c460af45c955
                                    • Opcode Fuzzy Hash: c468d1216cde06419113a54099f6d5c6cf0f2a208495e8b92ad19b3780d130a6
                                    • Instruction Fuzzy Hash: 1BF0346454E3C58FC763C778C8556987FB09F0B220B1A02CBD990CF2F3D2694A59E752
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3342795684.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2910000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2bb1a8590f8462d42d5425754cd3081bdced74acd8a23bc58347a4d47005ef37
                                    • Instruction ID: 1640d462b124ef9444125dafda4ae32e6a4261b97d8acccb64492fbf51fb155a
                                    • Opcode Fuzzy Hash: 2bb1a8590f8462d42d5425754cd3081bdced74acd8a23bc58347a4d47005ef37
                                    • Instruction Fuzzy Hash: 49E09A7080E3C49FC71797B454A92E87F358F23218F2A00DAC884AB2A3C73A0E56C752
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3342795684.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2910000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cbb5490a171df5fcc10e29a420f1834139c1f74815812d1e33ef51cacb47603d
                                    • Instruction ID: 6de4086041b9f609e51d1d68d9a5d7c15f61282f265300ddd2c095ae15e0a4b7
                                    • Opcode Fuzzy Hash: cbb5490a171df5fcc10e29a420f1834139c1f74815812d1e33ef51cacb47603d
                                    • Instruction Fuzzy Hash: 10E0B678911208DFCB44EFA9D58569CBFF4AB08215F6040E9D90497360E6319A90DB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3366023228.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 01382f8608e14a74b00068cc3d49a493bf594d525854cdcfa06745ba276fef99
                                    • Instruction ID: 4db576d000f4b5b5afd464e8e488f4fadf4c205f0a5acca0faf2320f9b4072b3
                                    • Opcode Fuzzy Hash: 01382f8608e14a74b00068cc3d49a493bf594d525854cdcfa06745ba276fef99
                                    • Instruction Fuzzy Hash: D8D05E34901108EFCB04DF98EA81A5AB7F8EB99315F208098D80847391DB32AE12DBD1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3366023228.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a89c2c506e3e28b364eb449c1cc111ed5147a1fe1d069f4e00edfea905b85947
                                    • Instruction ID: f500e32ad77238917d183c88f24ca526a4fd5267b481d466a0af4b69c917821d
                                    • Opcode Fuzzy Hash: a89c2c506e3e28b364eb449c1cc111ed5147a1fe1d069f4e00edfea905b85947
                                    • Instruction Fuzzy Hash: 27D05E34901004DFCB04DF58EA80A69B7F4EB99315F208198D80847390C7329E13DB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3342795684.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2910000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c0d350775ce3fdb867c283ffaccfec457a6dccd3cd2a90056cec05949bbf6b15
                                    • Instruction ID: e35e9e27bdd32753bc62ebdef0b54f1929f099674a5438be6cac39d9e4027e0e
                                    • Opcode Fuzzy Hash: c0d350775ce3fdb867c283ffaccfec457a6dccd3cd2a90056cec05949bbf6b15
                                    • Instruction Fuzzy Hash: 63D0C970842208DBCB19EBA99544699776DDB1122AF6040EC980426290DB769A90EBD1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3366023228.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fe2a06fc52192f2617bdf52accf12857201490fdd2b906be86e13752300ad809
                                    • Instruction ID: 578ee5007b55445775343fa52efe4fa20c7122072751cede608384aa6fd620a0
                                    • Opcode Fuzzy Hash: fe2a06fc52192f2617bdf52accf12857201490fdd2b906be86e13752300ad809
                                    • Instruction Fuzzy Hash: 27C08C3098220D4AF81D3698A644B75318E8B91325FA0466122191A6E29AA5A9A1E2AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3340939125.0000000001180000.00000040.00000800.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1180000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: pnq
                                    • API String ID: 0-1150273632
                                    • Opcode ID: 2db43e04d9bf1b4efe601012569712e13cee4b7f21ad865ab23702b579fb3c03
                                    • Instruction ID: 34bd94f0d6a07a5e8d42216af3bf9fd8be6df03b63c303b778b04a8faf15aa33
                                    • Opcode Fuzzy Hash: 2db43e04d9bf1b4efe601012569712e13cee4b7f21ad865ab23702b579fb3c03
                                    • Instruction Fuzzy Hash: 99020375A00218DFDB19DFA9D980E9DBBB2FF49304F1580A9E509AB232DB31D991DF10

                                    Execution Graph

                                    Execution Coverage:11.8%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:180
                                    Total number of Limit Nodes:8
                                    execution_graph 26926 2ba76a8 DuplicateHandle 26927 2ba773e 26926->26927 27034 2bafc08 27037 2baf60c 27034->27037 27038 2bafc38 SetWindowLongW 27037->27038 27039 2bafc20 27038->27039 27040 2ba0889 27041 2ba088f 27040->27041 27045 5344ab0 27041->27045 27049 5344ac0 27041->27049 27042 2ba08a0 27047 5344aeb 27045->27047 27046 5344b18 27046->27042 27047->27046 27053 534770e 27047->27053 27050 5344aeb 27049->27050 27051 5344b18 27050->27051 27052 534770e CreateWindowExW 27050->27052 27051->27042 27052->27051 27054 5347746 27053->27054 27055 53477a1 27054->27055 27058 5348688 27054->27058 27063 5348679 27054->27063 27055->27046 27059 53486a9 27058->27059 27060 53486b8 27059->27060 27068 53487d8 27059->27068 27073 53487c8 27059->27073 27060->27055 27064 53486a9 27063->27064 27065 53486b8 27064->27065 27066 53487d8 CreateWindowExW 27064->27066 27067 53487c8 CreateWindowExW 27064->27067 27065->27055 27066->27065 27067->27065 27069 53487ec 27068->27069 27078 5348848 27069->27078 27083 5348820 27069->27083 27070 53487fc 27070->27060 27074 53487d8 27073->27074 27076 5348820 CreateWindowExW 27074->27076 27077 5348848 CreateWindowExW 27074->27077 27075 53487fc 27075->27060 27076->27075 27077->27075 27080 5348870 27078->27080 27079 53488c4 27079->27070 27079->27079 27080->27079 27088 534863c 27080->27088 27082 5348dce 27082->27070 27085 5348870 27083->27085 27084 53488c4 27084->27070 27084->27084 27085->27084 27086 534863c CreateWindowExW 27085->27086 27087 5348dce 27086->27087 27087->27070 27089 5348647 27088->27089 27091 2bae6c8 CreateWindowExW 27089->27091 27092 2bae6c2 CreateWindowExW 27089->27092 27090 534ae2a 27090->27082 27091->27090 27092->27090 26928 5347260 26929 53472c7 CreateFileMappingW 26928->26929 26931 534737d 26929->26931 27023 5347510 27024 5347555 MapViewOfFile 27023->27024 27025 53475a3 27024->27025 27026 5347ad0 27028 5347af7 27026->27028 27027 5347bd4 27027->27027 27028->27027 27030 5346d64 27028->27030 27031 5347f50 CreateActCtxA 27030->27031 27033 5348013 27031->27033 26932 2ba6ca0 26936 2ba6cd0 26932->26936 26941 2ba6d97 26932->26941 26933 2ba6cb0 26937 2ba6d0a 26936->26937 26938 2ba6e01 26937->26938 26946 2ba6f40 26937->26946 26950 2ba6f31 26937->26950 26938->26933 26942 2ba6d9c 26941->26942 26943 2ba6e01 26942->26943 26944 2ba6f40 4 API calls 26942->26944 26945 2ba6f31 4 API calls 26942->26945 26943->26933 26944->26943 26945->26943 26947 2ba6f4d 26946->26947 26949 2ba6f87 26947->26949 26954 2ba6a70 26947->26954 26949->26938 26951 2ba6f87 26950->26951 26952 2ba6f3a 26950->26952 26951->26938 26952->26951 26953 2ba6a70 4 API calls 26952->26953 26953->26951 26955 2ba6a7b 26954->26955 26957 2ba7ca0 26955->26957 26958 2ba7124 26955->26958 26959 2ba712f 26958->26959 26965 2ba7d1e 26959->26965 26966 2bab260 26959->26966 26970 2bab251 26959->26970 26960 2ba7d49 26960->26957 26974 2bad028 26965->26974 26982 2bad040 26965->26982 26967 2bab28e 26966->26967 26968 2bab35a KiUserCallbackDispatcher 26967->26968 26969 2bab486 26967->26969 26968->26969 26969->26969 26971 2bab28e 26970->26971 26972 2bab35a KiUserCallbackDispatcher 26971->26972 26973 2bab486 26971->26973 26972->26973 26973->26973 26975 2bad040 26974->26975 26977 2bad07d 26975->26977 26991 2bad3a8 26975->26991 26994 2bad398 26975->26994 26976 2bad0be 26997 2bae6c8 26976->26997 27002 2bae6c2 26976->27002 26977->26960 26984 2bad071 26982->26984 26986 2bad172 26982->26986 26983 2bad07d 26983->26960 26984->26983 26989 2bad3a8 GetModuleHandleW 26984->26989 26990 2bad398 GetModuleHandleW 26984->26990 26985 2bad0be 26987 2bae6c8 CreateWindowExW 26985->26987 26988 2bae6c2 CreateWindowExW 26985->26988 26986->26960 26987->26986 26988->26986 26989->26985 26990->26985 27007 2bad3e8 26991->27007 26992 2bad3b2 26992->26976 26995 2bad3b2 26994->26995 26996 2bad3e8 GetModuleHandleW 26994->26996 26995->26976 26996->26995 26998 2bae6f3 26997->26998 26999 2bae7a2 26998->26999 27012 2baf59a 26998->27012 27016 2baf5a0 26998->27016 27003 2bae6c8 27002->27003 27004 2bae7a2 27003->27004 27005 2baf59a CreateWindowExW 27003->27005 27006 2baf5a0 CreateWindowExW 27003->27006 27005->27004 27006->27004 27008 2bad42c 27007->27008 27009 2bad409 27007->27009 27008->26992 27009->27008 27010 2bad630 GetModuleHandleW 27009->27010 27011 2bad65d 27010->27011 27011->26992 27013 2baf5a0 27012->27013 27019 2bac45c 27013->27019 27017 2bac45c CreateWindowExW 27016->27017 27018 2baf5d5 27017->27018 27018->26999 27020 2baf9f0 CreateWindowExW 27019->27020 27022 2bafb14 27020->27022 26867 111d01c 26868 111d034 26867->26868 26869 111d08e 26868->26869 26872 5340c58 26868->26872 26879 5340c48 26868->26879 26873 5340c85 26872->26873 26874 5340cb7 26873->26874 26887 5340de0 26873->26887 26892 5340dd2 26873->26892 26897 534ae50 26873->26897 26902 534ae60 26873->26902 26880 5340c57 26879->26880 26881 5340c14 26879->26881 26882 5340cb7 26880->26882 26883 5340de0 2 API calls 26880->26883 26884 534ae60 2 API calls 26880->26884 26885 534ae50 2 API calls 26880->26885 26886 5340dd2 2 API calls 26880->26886 26881->26869 26883->26882 26884->26882 26885->26882 26886->26882 26889 5340df4 26887->26889 26888 5340e80 26888->26874 26907 5340e87 26889->26907 26911 5340e98 26889->26911 26893 5340de0 26892->26893 26895 5340e87 2 API calls 26893->26895 26896 5340e98 2 API calls 26893->26896 26894 5340e80 26894->26874 26895->26894 26896->26894 26898 534ae60 26897->26898 26900 5342300 CallWindowProcW 26898->26900 26901 53422f0 CallWindowProcW 26898->26901 26899 534aece 26899->26874 26900->26899 26901->26899 26904 534ae77 26902->26904 26903 534aece 26903->26874 26905 5342300 CallWindowProcW 26904->26905 26906 53422f0 CallWindowProcW 26904->26906 26905->26903 26906->26903 26908 5340e98 26907->26908 26909 5340ea9 26908->26909 26914 53422d0 26908->26914 26909->26888 26912 5340ea9 26911->26912 26913 53422d0 2 API calls 26911->26913 26912->26888 26913->26912 26918 5342300 26914->26918 26922 53422f0 26914->26922 26915 53422ea 26915->26909 26919 5342342 26918->26919 26921 5342349 26918->26921 26920 534239a CallWindowProcW 26919->26920 26919->26921 26920->26921 26921->26915 26923 5342300 26922->26923 26924 534239a CallWindowProcW 26923->26924 26925 5342349 26923->26925 26924->26925 26925->26915

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 858 5347254-53472c5 860 53472e4-53472e8 858->860 861 53472c7-53472e3 858->861 862 5347308-5347313 860->862 863 53472ea-5347300 860->863 861->860 864 5347315-5347318 862->864 865 534731b-534737b CreateFileMappingW 862->865 863->862 864->865 867 5347384-53473c2 865->867 868 534737d-5347383 865->868 872 53473c4-53473c8 867->872 873 53473d7-53473db 867->873 868->867 872->873 876 53473ca-53473cd 872->876 874 53473ec 873->874 875 53473dd-53473e9 873->875 878 53473ed 874->878 875->874 876->873 878->878
                                    APIs
                                    • CreateFileMappingW.KERNELBASE(?,00000000,?,?,00000001,00000000), ref: 0534736B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2067886685.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5340000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: CreateFileMapping
                                    • String ID: 4Ljq
                                    • API String ID: 524692379-2677868233
                                    • Opcode ID: 52be867de9a5942e44419dce5f3578a646f904711c4a8dadd5725fd2bcab4d43
                                    • Instruction ID: 24df5af304669c2cf7630dc7c1d78376a81eaf11433fc56ab44d8a8dd3aef739
                                    • Opcode Fuzzy Hash: 52be867de9a5942e44419dce5f3578a646f904711c4a8dadd5725fd2bcab4d43
                                    • Instruction Fuzzy Hash: 9D51E5B1D143489FDB14CFAAC888B9EBBF5FF48314F24812AE419AB251D7B4A445CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 879 5347260-53472c5 880 53472e4-53472e8 879->880 881 53472c7-53472e3 879->881 882 5347308-5347313 880->882 883 53472ea-5347300 880->883 881->880 884 5347315-5347318 882->884 885 534731b-534737b CreateFileMappingW 882->885 883->882 884->885 887 5347384-53473c2 885->887 888 534737d-5347383 885->888 892 53473c4-53473c8 887->892 893 53473d7-53473db 887->893 888->887 892->893 896 53473ca-53473cd 892->896 894 53473ec 893->894 895 53473dd-53473e9 893->895 898 53473ed 894->898 895->894 896->893 898->898
                                    APIs
                                    • CreateFileMappingW.KERNELBASE(?,00000000,?,?,00000001,00000000), ref: 0534736B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2067886685.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5340000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: CreateFileMapping
                                    • String ID: 4Ljq
                                    • API String ID: 524692379-2677868233
                                    • Opcode ID: cfa89be423c2322c6508a8ab0de0c88357e9a6cfb4138de70c66acd005d445b0
                                    • Instruction ID: ee7f55ac2ec0a66861b663531b06cc033d8adafc6b6933191e079b346c572811
                                    • Opcode Fuzzy Hash: cfa89be423c2322c6508a8ab0de0c88357e9a6cfb4138de70c66acd005d445b0
                                    • Instruction Fuzzy Hash: F751F5B1D143489FDB14CFAAC888B9EBBF5FF48314F24812AE419AB251D7B4A445CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1073 2bad3e8-2bad407 1074 2bad409-2bad416 call 2bac294 1073->1074 1075 2bad433-2bad437 1073->1075 1080 2bad418 1074->1080 1081 2bad42c 1074->1081 1077 2bad44b-2bad48c 1075->1077 1078 2bad439-2bad443 1075->1078 1084 2bad499-2bad4a7 1077->1084 1085 2bad48e-2bad496 1077->1085 1078->1077 1129 2bad41e call 2bad689 1080->1129 1130 2bad41e call 2bad690 1080->1130 1081->1075 1086 2bad4cb-2bad4cd 1084->1086 1087 2bad4a9-2bad4ae 1084->1087 1085->1084 1092 2bad4d0-2bad4d7 1086->1092 1089 2bad4b9 1087->1089 1090 2bad4b0-2bad4b7 call 2bac2a0 1087->1090 1088 2bad424-2bad426 1088->1081 1091 2bad568-2bad628 1088->1091 1094 2bad4bb-2bad4c9 1089->1094 1090->1094 1124 2bad62a-2bad62d 1091->1124 1125 2bad630-2bad65b GetModuleHandleW 1091->1125 1095 2bad4d9-2bad4e1 1092->1095 1096 2bad4e4-2bad4eb 1092->1096 1094->1092 1095->1096 1098 2bad4f8-2bad501 call 2bac2b0 1096->1098 1099 2bad4ed-2bad4f5 1096->1099 1104 2bad50e-2bad513 1098->1104 1105 2bad503-2bad50b 1098->1105 1099->1098 1106 2bad531-2bad53e 1104->1106 1107 2bad515-2bad51c 1104->1107 1105->1104 1114 2bad540-2bad55e 1106->1114 1115 2bad561-2bad567 1106->1115 1107->1106 1109 2bad51e-2bad52e call 2bac068 call 2bac2c0 1107->1109 1109->1106 1114->1115 1124->1125 1126 2bad65d-2bad663 1125->1126 1127 2bad664-2bad678 1125->1127 1126->1127 1129->1088 1130->1088
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 02BAD64E
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021490922.0000000002BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_2ba0000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 7c27c69387db40579eae918906e4b163fc3be1c6e7f8562f6ebb73a79a4d72f8
                                    • Instruction ID: cf8dd72776e2ea2c4a39c450c38d8460cf12459662ad4cf3c1e6465f32c64b26
                                    • Opcode Fuzzy Hash: 7c27c69387db40579eae918906e4b163fc3be1c6e7f8562f6ebb73a79a4d72f8
                                    • Instruction Fuzzy Hash: 2B817870A04B058FD728DF29D064B9ABBF1FF88304F04896ED48AD7A40DB74E845CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1131 2bac45c-2bafa56 1133 2bafa58-2bafa5e 1131->1133 1134 2bafa61-2bafa68 1131->1134 1133->1134 1135 2bafa6a-2bafa70 1134->1135 1136 2bafa73-2bafb12 CreateWindowExW 1134->1136 1135->1136 1138 2bafb1b-2bafb53 1136->1138 1139 2bafb14-2bafb1a 1136->1139 1143 2bafb60 1138->1143 1144 2bafb55-2bafb58 1138->1144 1139->1138 1144->1143
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02BAFB02
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021490922.0000000002BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_2ba0000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: c2af66f14af2d8d5df00857bfb2b2cef10523a363edb6c4216328590a0ed42df
                                    • Instruction ID: 20c2cbff114ce7945dff44dad086df14e6117a0a4d76a6188f73a7b4e2464256
                                    • Opcode Fuzzy Hash: c2af66f14af2d8d5df00857bfb2b2cef10523a363edb6c4216328590a0ed42df
                                    • Instruction Fuzzy Hash: 3251DFB1D00309AFDB14CF9AC994ADEBBB5FF48304F64816AE819AB210D7759885CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1145 5346cfa-5346cfb 1146 5346cfd-5346d10 1145->1146 1147 5346d6a-5347fcb 1145->1147 1146->1147 1150 5347fd3-5348011 CreateActCtxA 1147->1150 1151 5348013-5348019 1150->1151 1152 534801a-5348074 1150->1152 1151->1152 1159 5348076-5348079 1152->1159 1160 5348083-5348087 1152->1160 1159->1160 1161 5348098 1160->1161 1162 5348089-5348095 1160->1162 1164 5348099 1161->1164 1162->1161 1164->1164
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 05348001
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2067886685.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5340000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 5df84f45f2af473613dcefd738e9a8489b091f4f690b6e62c14ecdf32907919d
                                    • Instruction ID: cbe632b39373619e2ce5b85cc2a3b9d9d75020a371cebd8368e9f68035041edb
                                    • Opcode Fuzzy Hash: 5df84f45f2af473613dcefd738e9a8489b091f4f690b6e62c14ecdf32907919d
                                    • Instruction Fuzzy Hash: 1E41F0B1C04319CECB25DFA9C854A9DBBF5BF49304F24806AD408AB255D7B5694ACF90
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 05348001
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2067886685.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5340000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: b807509a970f33a99619121b4c8865692e49c95ed6dc7a5577bba3626fda71fb
                                    • Instruction ID: 577ff00bab85d15a6dae314880ae24d6bf4550ecd505f1503393b944d8589371
                                    • Opcode Fuzzy Hash: b807509a970f33a99619121b4c8865692e49c95ed6dc7a5577bba3626fda71fb
                                    • Instruction Fuzzy Hash: 0F41E2B0C10619CBDB24DFA9C844B9DFBF5BF49304F20846AD408AB255DBB5694ACF90
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 05348001
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2067886685.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5340000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 7ff680d3451848c27033be8864ec5bcd9b95a41f3fe9176710622c2d15e135b9
                                    • Instruction ID: dca356feb75b3db9ff03ab8c261512c2cebdb8ec38cb73fbe5a455f798616374
                                    • Opcode Fuzzy Hash: 7ff680d3451848c27033be8864ec5bcd9b95a41f3fe9176710622c2d15e135b9
                                    • Instruction Fuzzy Hash: 1B4101B1C10619CFDB24DFA9C944B9DFBF5BF48304F20806AD418AB255DBB5694ACF50
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 053423C1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2067886685.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5340000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: f09b038290f94f84f4acaa9d34be4e4cd7b9e8b722ccde35d86cc725d4ba3b60
                                    • Instruction ID: 1ed2620411e4f0df5e7cdca5477ef0effaac875d684c2d1a7def41a51d983bba
                                    • Opcode Fuzzy Hash: f09b038290f94f84f4acaa9d34be4e4cd7b9e8b722ccde35d86cc725d4ba3b60
                                    • Instruction Fuzzy Hash: 574108B99002059FCB14CF99C448AABBBF5FF89314F24C499E519AB321D775A841CFA0
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02BA772F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021490922.0000000002BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_2ba0000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 5012de499c48df428c2c7950475b1bb9b4224797887c6232aa72bd8fc3935a69
                                    • Instruction ID: 4d0b8333aea23301a82b073679356398b420b98df28019cdcf8334806fe04ff4
                                    • Opcode Fuzzy Hash: 5012de499c48df428c2c7950475b1bb9b4224797887c6232aa72bd8fc3935a69
                                    • Instruction Fuzzy Hash: 3121E5B5D00208AFDB10CFAAD584ADEFBF5FB48310F14845AE918A3250D378A944CFA5
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02BA772F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021490922.0000000002BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_2ba0000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: e614937d24114ea933ef9c3723053915fd3f0f7e1d8fa6da26f3715fc44f4d20
                                    • Instruction ID: 5f61245850bbf46c65ed6919a7b14515426ac8dcd86573cef476539c3524ba04
                                    • Opcode Fuzzy Hash: e614937d24114ea933ef9c3723053915fd3f0f7e1d8fa6da26f3715fc44f4d20
                                    • Instruction Fuzzy Hash: 9721C2B59002489FDB10CFAAD984ADEFBF9FB48310F14845AE918A3350D378A954CFA5
                                    APIs
                                    • MapViewOfFile.KERNELBASE(?,?,?,00000001,00000004), ref: 05347594
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2067886685.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5340000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: FileView
                                    • String ID:
                                    • API String ID: 3314676101-0
                                    • Opcode ID: da822ed69160a297249eaf941c5d0270e39ed9754930dbd0cc3898b6d0a0adcd
                                    • Instruction ID: 2ee1b86c8632a62ff6afcdcb29d222837bb0701c2e31368e26510aa4ba8a4e9c
                                    • Opcode Fuzzy Hash: da822ed69160a297249eaf941c5d0270e39ed9754930dbd0cc3898b6d0a0adcd
                                    • Instruction Fuzzy Hash: 332103B58102489FCB10CF9AD588A8ABFF5FF48314F14C459E908AB261D775A844CF60
                                    APIs
                                    • MapViewOfFile.KERNELBASE(?,?,?,00000001,00000004), ref: 05347594
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2067886685.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_5340000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: FileView
                                    • String ID:
                                    • API String ID: 3314676101-0
                                    • Opcode ID: 9e6e9e786d15e3f23e9adcbe572fa8941e73ba1f4e1ce7d492548198702d1a48
                                    • Instruction ID: 09b3f223698f0851ab46e73685f430b8f0a165190d5ca7988e57e1405af35a33
                                    • Opcode Fuzzy Hash: 9e6e9e786d15e3f23e9adcbe572fa8941e73ba1f4e1ce7d492548198702d1a48
                                    • Instruction Fuzzy Hash: 5B21E2B58002489FCB10CF9AD588B8EFFF5EF48314F14C05AE918AB261D779A844CF60
                                    APIs
                                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02BAFC20,?,?,?,?), ref: 02BAFC95
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021490922.0000000002BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_2ba0000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: LongWindow
                                    • String ID:
                                    • API String ID: 1378638983-0
                                    • Opcode ID: d5efc1f682f79cee2b1cb5b9698cef61ae2b2ceb8402cdbdf54f04eb26bdfb86
                                    • Instruction ID: d27e8c49b8945c55175850d2b9a492be59ca0ed26049686ac102c40f6f8739da
                                    • Opcode Fuzzy Hash: d5efc1f682f79cee2b1cb5b9698cef61ae2b2ceb8402cdbdf54f04eb26bdfb86
                                    • Instruction Fuzzy Hash: 191106B58042489FDB10DF9AC588BEEFBF8EB48314F10845AD918A7740D379A944CFA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 02BAD64E
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021490922.0000000002BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_2ba0000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: bcc856a9dd5559ffaddb733387ea8abe87816568f9b2edec50b69ebe817beeab
                                    • Instruction ID: 323d43663aecf6b334ba3257f4ea70b9d03481c3782dc5b500dc2bf43c13b80b
                                    • Opcode Fuzzy Hash: bcc856a9dd5559ffaddb733387ea8abe87816568f9b2edec50b69ebe817beeab
                                    • Instruction Fuzzy Hash: F01122B6C003498FCB10CF9AC444ADEFBF4EF88314F10845AD828A7600C379A545CFA1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021133238.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_110d000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 33bc7c6a76defe12a4b9eaf71b427e7a4aa4170a48d0f666ec829cf4c423a655
                                    • Instruction ID: fc5f2d9652bacf4cb00901e94d2245de7454a71a4058deb2659cfd62061e1f72
                                    • Opcode Fuzzy Hash: 33bc7c6a76defe12a4b9eaf71b427e7a4aa4170a48d0f666ec829cf4c423a655
                                    • Instruction Fuzzy Hash: 7C21F771900204DFDF0ADF98E5C0B16BF75FB88318F208569ED090B296C376D456C6A2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021133238.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_110d000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 271899ae4c3156c86e9dc664d49f5f3cb50ad27675e44551cd0b9651000639d9
                                    • Instruction ID: 87a5db7d3c25d092ad4280ecc7424b06c45c794c4b71d1080357f3d4d2ace3fa
                                    • Opcode Fuzzy Hash: 271899ae4c3156c86e9dc664d49f5f3cb50ad27675e44551cd0b9651000639d9
                                    • Instruction Fuzzy Hash: D2210671900204DFDF0ADF98E9C0B66BF65FB94320F21C569E9094B696C37AE416C7A2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021164075.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_111d000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e6b5d7300c0d55372cbd41397efd04779c7d610661df972e4e0cdc33fc6cd7dc
                                    • Instruction ID: 620d7b9b2e11a22d8f338fee6e4641ed9255ac52b76976fcc1d9a2685f69e194
                                    • Opcode Fuzzy Hash: e6b5d7300c0d55372cbd41397efd04779c7d610661df972e4e0cdc33fc6cd7dc
                                    • Instruction Fuzzy Hash: A5210075604200DFCF19DF68E988B26FF65EB88314F20C5BDD90A0B25AC33AD406CA62
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021133238.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_110d000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 4b8e782e4ff2ae3b79a008bac9264378e7ae5f22d0d26cc82f7ac824ccbc41de
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 6611AF76904240CFDF16CF94E5C4B16BF71FB88324F2486A9DD090B256C33AD45ACBA2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021133238.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_110d000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 2570ac9012467b149c4cff900ed1024b47ac2ca1eecd400eb590e0bbad9a2972
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 7411DF72804244DFCF06CF84D9C4B56BF62FB84320F24C5A9D9094B656C33AE45ACBA2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021164075.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_111d000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction ID: ffb686f9e80ca277671ef4a9440f304b356177e4873fa2bc8d4f4ba60932b932
                                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                    • Instruction Fuzzy Hash: 4111D075504280CFDB16CF58E5C8B15FF61FB44314F24C6A9D8494B65AC33BD44ACB62
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021133238.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_110d000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d0c18a09e33ccc898d11b479e489bca29a4c0b3bfc61ef5796e8f7eee1e970ce
                                    • Instruction ID: 66425cbc96ec56056ea896ec31118c7de853e7c928b356276329087090072461
                                    • Opcode Fuzzy Hash: d0c18a09e33ccc898d11b479e489bca29a4c0b3bfc61ef5796e8f7eee1e970ce
                                    • Instruction Fuzzy Hash: A2F049B6600604AF9724CF0ADC84C27FBADEFC4730319C05AE84A4B652C771EC41CEA0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2021133238.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_110d000_bpaymentcopy.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ae3c67af10e4430ad70d50fbadcdc612992d531d6da0f03850356933c05207d3
                                    • Instruction ID: 825c678c7fd33a523752b527869d44eeaaa52f67f15c07b9bd65a558ee354ad5
                                    • Opcode Fuzzy Hash: ae3c67af10e4430ad70d50fbadcdc612992d531d6da0f03850356933c05207d3
                                    • Instruction Fuzzy Hash: 1CF03C75104684AFD7168F46CD84C62BFB9EF856607198489E8894B252C671FC42CF61

                                    Execution Graph

                                    Execution Coverage:15.6%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:68
                                    Total number of Limit Nodes:0
                                    execution_graph 11691 13be7b8 11692 13be7f8 ResumeThread 11691->11692 11694 13be829 11692->11694 11760 13bec88 11761 13bed11 11760->11761 11761->11761 11762 13bee76 CreateProcessA 11761->11762 11763 13beed3 11762->11763 11764 13b4ae8 11765 13b4b12 LdrInitializeThunk 11764->11765 11767 13b4e87 11765->11767 11768 13be868 11769 13be8ad Wow64SetThreadContext 11768->11769 11771 13be8f5 11769->11771 11695 13b8390 11696 13b839c 11695->11696 11699 13bbb20 11696->11699 11700 13bbb4c 11699->11700 11705 13bbbf8 11700->11705 11717 13bbbf4 11700->11717 11729 13bbf4e 11700->11729 11701 13b83ae 11707 13bbc1a 11705->11707 11706 13bbec3 11744 13ba884 11706->11744 11707->11706 11710 13bbe4c 11707->11710 11711 13bbc68 11707->11711 11736 13bd248 11707->11736 11740 13bd241 11707->11740 11709 13ba884 CloseHandle 11709->11706 11710->11709 11711->11701 11712 13bbf08 11712->11711 11748 13bd530 11712->11748 11752 13bd528 11712->11752 11719 13bbc1a 11717->11719 11718 13bbec3 11720 13ba884 CloseHandle 11718->11720 11719->11718 11722 13bbe4c 11719->11722 11723 13bbc68 11719->11723 11725 13bd248 CheckRemoteDebuggerPresent 11719->11725 11726 13bd241 CheckRemoteDebuggerPresent 11719->11726 11724 13bbf08 11720->11724 11721 13ba884 CloseHandle 11721->11718 11722->11721 11723->11701 11724->11723 11727 13bd528 EnumWindows 11724->11727 11728 13bd530 EnumWindows 11724->11728 11725->11722 11726->11722 11727->11723 11728->11723 11730 13bbecd 11729->11730 11731 13ba884 CloseHandle 11730->11731 11733 13bbf08 11731->11733 11732 13bbf3d 11732->11701 11733->11732 11733->11733 11734 13bd528 EnumWindows 11733->11734 11735 13bd530 EnumWindows 11733->11735 11734->11732 11735->11732 11737 13bd290 CheckRemoteDebuggerPresent 11736->11737 11739 13bd2c5 11737->11739 11739->11710 11741 13bd290 CheckRemoteDebuggerPresent 11740->11741 11743 13bd2c5 11741->11743 11743->11710 11745 13bd308 CloseHandle 11744->11745 11747 13bd376 11745->11747 11747->11712 11749 13bd571 EnumWindows 11748->11749 11751 13bd5b7 11749->11751 11751->11711 11753 13bd571 EnumWindows 11752->11753 11755 13bd5b7 11753->11755 11755->11711 11756 13beaf0 11757 13beb3b ReadProcessMemory 11756->11757 11759 13beb7f 11757->11759 11772 13bea00 11773 13bea48 WriteProcessMemory 11772->11773 11775 13bea9f 11773->11775 11776 13be940 11777 13be980 VirtualAllocEx 11776->11777 11779 13be9bd 11777->11779

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 13b4a6a-13b4a7c 1 13b4a7e-13bcafa 0->1 2 13b4adc-13b4e5e 0->2 10 13bcafc-13bcaff 1->10 11 13bcb02-13bcb2d 1->11 52 13b4e68-13b4e7d LdrInitializeThunk 2->52 10->11 14 13bcb2f-13bcb35 11->14 15 13bcb36-13bcb53 11->15 14->15 53 13b4e87-13b4eb7 52->53 57 13b4eb9-13b4ebe 53->57 58 13b4f13-13b4f25 53->58 59 13b4ec2-13b4ecd 57->59 69 13b4f37-13b4f3c 58->69 60 13b4ecf-13b4ed4 59->60 61 13b4f27-13b4f2c 59->61 63 13b4eff-13b4f06 60->63 64 13b4ed6-13b4edf 60->64 61->69 63->59 67 13b4f08-13b4f11 63->67 64->61 66 13b4ee1-13b4efd 64->66 66->67 67->57 67->58 71 13b4f46-13b4f6f 69->71 73 13b4f79-13b4fa5 call 13b7ee7 71->73 74 13b4fab-13b4fb7 73->74 75 13b4fc1-13b4fcc call 13b7ee7 74->75 76 13b4fd2-13b4fde 75->76 77 13b4fe8-13b4feb 76->77 78 13b4ff3-13b7788 77->78 563 13b7ecf-13b7ed4 78->563 564 13b778e-13b77b8 78->564 567 13b7edf-13b7ee6 563->567 569 13b77c0-13b77d5 564->569 570 13b77db-13b7947 569->570 593 13b7951-13b7958 570->593 595 13b795f-13b796a 593->595 597 13b7979-13b797d 595->597 598 13b796c-13b7977 595->598 599 13b7983-13b7992 597->599 600 13b7e75-13b7e77 597->600 598->597 610 13b79d8-13b7b18 599->610 611 13b7994-13b79a3 599->611 602 13b7e79-13b7e7d 600->602 603 13b7e93-13b7e95 600->603 602->603 606 13b7e7f-13b7e91 602->606 604 13b7eab-13b7eaf 603->604 605 13b7e97-13b7ea9 603->605 608 13b7ec3-13b7ec7 604->608 609 13b7eb1-13b7ebc 604->609 605->608 606->608 608->570 614 13b7ecd 608->614 609->608 610->600 689 13b7b1e-13b7bc2 610->689 618 13b79a9-13b79b8 611->618 619 13b7bc7-13b7bcb 611->619 614->567 627 13b79be-13b79cd 618->627 628 13b7c91-13b7d5e 618->628 620 13b7bd1-13b7c72 619->620 621 13b7c77-13b7c7b 619->621 620->600 621->600 623 13b7c81-13b7c8c 621->623 623->600 634 13b7d63-13b7d67 627->634 635 13b79d3 627->635 628->600 637 13b7d6d-13b7e44 634->637 638 13b7e46-13b7e6e 634->638 635->600 637->600 638->600 689->600
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ($($-$.$F$U$oq^
                                    • API String ID: 0-395701549
                                    • Opcode ID: b98bc39866f5ac0553d4f484e913109565fd199c32512c90b4c94bae4a9c5d7f
                                    • Instruction ID: 9a355e270bf1fde993c51bcfd69d08f8c25a7a3c091fc022adb06b9bcc01f98f
                                    • Opcode Fuzzy Hash: b98bc39866f5ac0553d4f484e913109565fd199c32512c90b4c94bae4a9c5d7f
                                    • Instruction Fuzzy Hash: AC532F74A402198FCB54DF69DD94A9DB7BABF88304F10C5D8D80EAB369DA305E84CF58

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 702 13b4ae8-13b4eb7 LdrInitializeThunk 746 13b4eb9-13b4ebe 702->746 747 13b4f13-13b4f25 702->747 748 13b4ec2-13b4ecd 746->748 758 13b4f37-13b7788 call 13b7ee7 * 2 747->758 749 13b4ecf-13b4ed4 748->749 750 13b4f27-13b4f2c 748->750 752 13b4eff-13b4f06 749->752 753 13b4ed6-13b4edf 749->753 750->758 752->748 756 13b4f08-13b4f11 752->756 753->750 755 13b4ee1-13b4efd 753->755 755->756 756->746 756->747 1252 13b7ecf-13b7ed4 758->1252 1253 13b778e-13b77d5 758->1253 1256 13b7edf-13b7ee6 1252->1256 1259 13b77db-13b7958 1253->1259 1284 13b795f-13b796a 1259->1284 1286 13b7979-13b797d 1284->1286 1287 13b796c-13b7977 1284->1287 1288 13b7983-13b7992 1286->1288 1289 13b7e75-13b7e77 1286->1289 1287->1286 1299 13b79d8-13b7b18 1288->1299 1300 13b7994-13b79a3 1288->1300 1291 13b7e79-13b7e7d 1289->1291 1292 13b7e93-13b7e95 1289->1292 1291->1292 1295 13b7e7f-13b7e91 1291->1295 1293 13b7eab-13b7eaf 1292->1293 1294 13b7e97-13b7ea9 1292->1294 1297 13b7ec3-13b7ec7 1293->1297 1298 13b7eb1-13b7ebc 1293->1298 1294->1297 1295->1297 1297->1259 1303 13b7ecd 1297->1303 1298->1297 1299->1289 1378 13b7b1e-13b7bc2 1299->1378 1307 13b79a9-13b79b8 1300->1307 1308 13b7bc7-13b7bcb 1300->1308 1303->1256 1316 13b79be-13b79cd 1307->1316 1317 13b7c91-13b7d5e 1307->1317 1309 13b7bd1-13b7c72 1308->1309 1310 13b7c77-13b7c7b 1308->1310 1309->1289 1310->1289 1312 13b7c81-13b7c8c 1310->1312 1312->1289 1323 13b7d63-13b7d67 1316->1323 1324 13b79d3 1316->1324 1317->1289 1326 13b7d6d-13b7e44 1323->1326 1327 13b7e46-13b7e6e 1323->1327 1324->1289 1326->1289 1327->1289 1378->1289
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: ($($-$.$F$U
                                    • API String ID: 2994545307-2826122012
                                    • Opcode ID: f967ec60656adc3d2410559d1aece686a892d4437092d4df3e5253ba3c2227df
                                    • Instruction ID: 06deb70e4280145629c28acd15891019b60c9ffed22de84c69ab3c64a3f06925
                                    • Opcode Fuzzy Hash: f967ec60656adc3d2410559d1aece686a892d4437092d4df3e5253ba3c2227df
                                    • Instruction Fuzzy Hash: 47532D74A402198FCB54DF69DD94A9DB7BABF88300F10C5D8D80EAB369DA345E84CF49

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1391 13b4ad8-13b4e5e 1430 13b4e68-13b4e7d LdrInitializeThunk 1391->1430 1431 13b4e87-13b4eb7 1430->1431 1435 13b4eb9-13b4ebe 1431->1435 1436 13b4f13-13b4f25 1431->1436 1437 13b4ec2-13b4ecd 1435->1437 1447 13b4f37-13b4f3c 1436->1447 1438 13b4ecf-13b4ed4 1437->1438 1439 13b4f27-13b4f2c 1437->1439 1441 13b4eff-13b4f06 1438->1441 1442 13b4ed6-13b4edf 1438->1442 1439->1447 1441->1437 1445 13b4f08-13b4f11 1441->1445 1442->1439 1444 13b4ee1-13b4efd 1442->1444 1444->1445 1445->1435 1445->1436 1449 13b4f46-13b4f6f 1447->1449 1451 13b4f79-13b4fa5 call 13b7ee7 1449->1451 1452 13b4fab-13b4fb7 1451->1452 1453 13b4fc1-13b4fcc call 13b7ee7 1452->1453 1454 13b4fd2-13b4fde 1453->1454 1455 13b4fe8-13b4feb 1454->1455 1456 13b4ff3-13b7788 1455->1456 1941 13b7ecf-13b7ed4 1456->1941 1942 13b778e-13b77b8 1456->1942 1945 13b7edf-13b7ee6 1941->1945 1947 13b77c0-13b77d5 1942->1947 1948 13b77db-13b7947 1947->1948 1971 13b7951-13b7958 1948->1971 1973 13b795f-13b796a 1971->1973 1975 13b7979-13b797d 1973->1975 1976 13b796c-13b7977 1973->1976 1977 13b7983-13b7992 1975->1977 1978 13b7e75-13b7e77 1975->1978 1976->1975 1988 13b79d8-13b7b18 1977->1988 1989 13b7994-13b79a3 1977->1989 1980 13b7e79-13b7e7d 1978->1980 1981 13b7e93-13b7e95 1978->1981 1980->1981 1984 13b7e7f-13b7e91 1980->1984 1982 13b7eab-13b7eaf 1981->1982 1983 13b7e97-13b7ea9 1981->1983 1986 13b7ec3-13b7ec7 1982->1986 1987 13b7eb1-13b7ebc 1982->1987 1983->1986 1984->1986 1986->1948 1992 13b7ecd 1986->1992 1987->1986 1988->1978 2067 13b7b1e-13b7bc2 1988->2067 1996 13b79a9-13b79b8 1989->1996 1997 13b7bc7-13b7bcb 1989->1997 1992->1945 2005 13b79be-13b79cd 1996->2005 2006 13b7c91-13b7d5e 1996->2006 1998 13b7bd1-13b7c72 1997->1998 1999 13b7c77-13b7c7b 1997->1999 1998->1978 1999->1978 2001 13b7c81-13b7c8c 1999->2001 2001->1978 2012 13b7d63-13b7d67 2005->2012 2013 13b79d3 2005->2013 2006->1978 2015 13b7d6d-13b7e44 2012->2015 2016 13b7e46-13b7e6e 2012->2016 2013->1978 2015->1978 2016->1978 2067->1978
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: ($($-$.$F$U
                                    • API String ID: 2994545307-2826122012
                                    • Opcode ID: d07db0fbcbb843398c8afa8aab99a7aa5edc7c8b90c4a4033bc577c160d6e386
                                    • Instruction ID: fd8aeb8da30ff64b7628c13c9cb35b1bd54a79aa0d43ae2ad388e9735025b123
                                    • Opcode Fuzzy Hash: d07db0fbcbb843398c8afa8aab99a7aa5edc7c8b90c4a4033bc577c160d6e386
                                    • Instruction Fuzzy Hash: E9431F74A402198FCB54DF69DD94A9DB7BABF88304F10C5D8D80EAB369DA305E84CF48

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2080 13b0797-13b079a 2081 13b079c-13b079e 2080->2081 2082 13b0785-13b07f3 2080->2082 2083 13b0811-13b0812 2081->2083 2084 13b07a0 2081->2084 2087 13b0852 2083->2087 2088 13b0814-13b081a 2083->2088 2086 13b07a5-13b07b2 2084->2086 2101 13b07f2-13b07f3 2086->2101 2102 13b07b4-13b07ba 2086->2102 2092 13b0859-13b085a 2087->2092 2186 13b0853 call 13b0860 2087->2186 2187 13b0853 call 13b0797 2087->2187 2090 13b088d-13b089e 2088->2090 2091 13b081c-13b0823 2088->2091 2094 13b08a0-13b08a3 2090->2094 2095 13b08a4 2090->2095 2091->2087 2094->2095 2097 13b08aa-13b08af 2095->2097 2098 13b08a6-13b08a7 2095->2098 2099 13b08b9-13b08bb 2097->2099 2100 13b08b1-13b08b8 2097->2100 2103 13b08a8 2098->2103 2104 13b0cf3-13b0d90 VirtualProtect 2098->2104 2105 13b08bc-13b0907 2099->2105 2100->2105 2108 13b0831-13b0851 2101->2108 2102->2086 2107 13b07bc-13b07be 2102->2107 2103->2097 2122 13b0d99-13b0dba 2104->2122 2123 13b0d92-13b0d98 2104->2123 2114 13b090d-13b0921 2105->2114 2115 13b09b2-13b09dd 2105->2115 2107->2108 2109 13b07c0-13b07cb 2107->2109 2184 13b0853 call 13b0860 2108->2184 2185 13b0853 call 13b0797 2108->2185 2109->2101 2117 13b094e-13b0950 2114->2117 2118 13b0923-13b0927 2114->2118 2136 13b09e0-13b09e8 2115->2136 2120 13b0952-13b0956 2117->2120 2121 13b09a0-13b09ac 2117->2121 2125 13b0929-13b092c 2118->2125 2126 13b092e 2118->2126 2127 13b0958-13b095b 2120->2127 2128 13b095d 2120->2128 2121->2114 2121->2115 2123->2122 2129 13b0931-13b093d 2125->2129 2126->2129 2130 13b0960-13b0978 2127->2130 2128->2130 2133 13b093f-13b0941 2129->2133 2134 13b0943 2129->2134 2130->2121 2135 13b097a-13b099e 2130->2135 2137 13b0946-13b094c 2133->2137 2134->2137 2135->2121 2135->2135 2136->2104 2138 13b09ee-13b09fd 2136->2138 2137->2121 2138->2104 2139 13b0a03-13b0a3d 2138->2139 2139->2136 2140 13b0a3f-13b0a48 2139->2140 2140->2104 2141 13b0a4e-13b0a5d 2140->2141 2141->2104 2142 13b0a63-13b0a6f 2141->2142 2142->2104 2143 13b0a75-13b0a81 2142->2143 2143->2104 2144 13b0a87-13b0a94 2143->2144 2144->2104 2145 13b0a9a-13b0aa3 2144->2145 2145->2104 2146 13b0aa9-13b0ab5 2145->2146 2146->2104 2147 13b0abb-13b0ac4 2146->2147 2147->2104 2148 13b0aca-13b0ad6 2147->2148 2148->2104 2149 13b0adc-13b0ae5 2148->2149 2149->2104 2150 13b0aeb-13b0af8 2149->2150 2150->2104 2151 13b0afe-13b0b07 2150->2151 2151->2104 2152 13b0b0d-13b0b19 2151->2152 2152->2104 2153 13b0b1f-13b0b28 2152->2153 2153->2104 2154 13b0b2e-13b0b3a 2153->2154 2154->2104 2155 13b0b40-13b0b49 2154->2155 2155->2104 2156 13b0b4f-13b0b5c 2155->2156 2156->2104 2157 13b0b62-13b0b6b 2156->2157 2157->2104 2158 13b0b71-13b0b7d 2157->2158 2158->2104 2159 13b0b83-13b0b8c 2158->2159 2159->2104 2160 13b0b92-13b0b9e 2159->2160 2160->2104 2161 13b0ba4-13b0bad 2160->2161 2161->2104 2162 13b0bb3-13b0bc0 2161->2162 2162->2104 2163 13b0bc6-13b0bcf 2162->2163 2163->2104 2164 13b0bd5-13b0be1 2163->2164 2164->2104 2165 13b0be7-13b0bf0 2164->2165 2165->2104 2166 13b0bf6-13b0c02 2165->2166 2166->2104 2167 13b0c08-13b0c11 2166->2167 2167->2104 2168 13b0c17-13b0c24 2167->2168 2168->2104 2169 13b0c2a-13b0c33 2168->2169 2169->2104 2170 13b0c39-13b0c45 2169->2170 2170->2104 2171 13b0c4b-13b0c54 2170->2171 2171->2104 2172 13b0c5a-13b0c63 2171->2172 2172->2104 2173 13b0c69-13b0c83 call 13b0464 2172->2173 2175 13b0c88-13b0c8c 2173->2175 2176 13b0c8e-13b0c95 2175->2176 2177 13b0c96-13b0c9e 2175->2177 2178 13b0ceb-13b0cf2 2177->2178 2179 13b0ca0 2177->2179 2180 13b0ca3-13b0cad 2179->2180 2180->2104 2181 13b0caf-13b0cc8 2180->2181 2181->2104 2182 13b0cca-13b0cde 2181->2182 2182->2104 2183 13b0ce0-13b0ce9 2182->2183 2183->2178 2183->2180 2184->2092 2185->2092 2186->2092 2187->2092
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @
                                    • API String ID: 0-2766056989
                                    • Opcode ID: 4671436944ee1b493bf053e925f966633ef9238e40e2cb389c85306c9bf24eb7
                                    • Instruction ID: 304186a42205fe147c8930144d15536e42534327185f71b4880728e806cb83b4
                                    • Opcode Fuzzy Hash: 4671436944ee1b493bf053e925f966633ef9238e40e2cb389c85306c9bf24eb7
                                    • Instruction Fuzzy Hash: C1021771E002098FDB18CF98C4D06EEBBB2FF49214F64855AE915EB649E334ED85CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2310 13bec7d-13bed1d 2313 13bed1f-13bed29 2310->2313 2314 13bed56-13bed76 2310->2314 2313->2314 2315 13bed2b-13bed2d 2313->2315 2319 13bed78-13bed82 2314->2319 2320 13bedaf-13bedde 2314->2320 2317 13bed2f-13bed39 2315->2317 2318 13bed50-13bed53 2315->2318 2321 13bed3b 2317->2321 2322 13bed3d-13bed4c 2317->2322 2318->2314 2319->2320 2324 13bed84-13bed86 2319->2324 2328 13bede0-13bedea 2320->2328 2329 13bee17-13beed1 CreateProcessA 2320->2329 2321->2322 2322->2322 2323 13bed4e 2322->2323 2323->2318 2325 13beda9-13bedac 2324->2325 2326 13bed88-13bed92 2324->2326 2325->2320 2330 13bed96-13beda5 2326->2330 2331 13bed94 2326->2331 2328->2329 2332 13bedec-13bedee 2328->2332 2342 13beeda-13bef60 2329->2342 2343 13beed3-13beed9 2329->2343 2330->2330 2333 13beda7 2330->2333 2331->2330 2334 13bee11-13bee14 2332->2334 2335 13bedf0-13bedfa 2332->2335 2333->2325 2334->2329 2337 13bedfe-13bee0d 2335->2337 2338 13bedfc 2335->2338 2337->2337 2339 13bee0f 2337->2339 2338->2337 2339->2334 2353 13bef62-13bef66 2342->2353 2354 13bef70-13bef74 2342->2354 2343->2342 2353->2354 2355 13bef68-13bef6b call 13b80a8 2353->2355 2356 13bef76-13bef7a 2354->2356 2357 13bef84-13bef88 2354->2357 2355->2354 2356->2357 2359 13bef7c-13bef7f call 13b80a8 2356->2359 2360 13bef8a-13bef8e 2357->2360 2361 13bef98-13bef9c 2357->2361 2359->2357 2360->2361 2363 13bef90-13bef93 call 13b80a8 2360->2363 2364 13befae-13befb5 2361->2364 2365 13bef9e-13befa4 2361->2365 2363->2361 2366 13befcc 2364->2366 2367 13befb7-13befc6 2364->2367 2365->2364 2370 13befcd 2366->2370 2367->2366 2370->2370
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 013BEEBE
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 921a2d1634a77ea773a36db96732e9325865e8aa07a06b2ef1cb21f27c5f23c2
                                    • Instruction ID: f5067c4f6a3b063fcfa3d7088426b98b224650f325d65576ce592cd8179b6e5a
                                    • Opcode Fuzzy Hash: 921a2d1634a77ea773a36db96732e9325865e8aa07a06b2ef1cb21f27c5f23c2
                                    • Instruction Fuzzy Hash: E8A17C71D00219CFEB20DF6CC8817EDBBB2BF48314F0485A9E919A7690EB749985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2371 13bec88-13bed1d 2373 13bed1f-13bed29 2371->2373 2374 13bed56-13bed76 2371->2374 2373->2374 2375 13bed2b-13bed2d 2373->2375 2379 13bed78-13bed82 2374->2379 2380 13bedaf-13bedde 2374->2380 2377 13bed2f-13bed39 2375->2377 2378 13bed50-13bed53 2375->2378 2381 13bed3b 2377->2381 2382 13bed3d-13bed4c 2377->2382 2378->2374 2379->2380 2384 13bed84-13bed86 2379->2384 2388 13bede0-13bedea 2380->2388 2389 13bee17-13beed1 CreateProcessA 2380->2389 2381->2382 2382->2382 2383 13bed4e 2382->2383 2383->2378 2385 13beda9-13bedac 2384->2385 2386 13bed88-13bed92 2384->2386 2385->2380 2390 13bed96-13beda5 2386->2390 2391 13bed94 2386->2391 2388->2389 2392 13bedec-13bedee 2388->2392 2402 13beeda-13bef60 2389->2402 2403 13beed3-13beed9 2389->2403 2390->2390 2393 13beda7 2390->2393 2391->2390 2394 13bee11-13bee14 2392->2394 2395 13bedf0-13bedfa 2392->2395 2393->2385 2394->2389 2397 13bedfe-13bee0d 2395->2397 2398 13bedfc 2395->2398 2397->2397 2399 13bee0f 2397->2399 2398->2397 2399->2394 2413 13bef62-13bef66 2402->2413 2414 13bef70-13bef74 2402->2414 2403->2402 2413->2414 2415 13bef68-13bef6b call 13b80a8 2413->2415 2416 13bef76-13bef7a 2414->2416 2417 13bef84-13bef88 2414->2417 2415->2414 2416->2417 2419 13bef7c-13bef7f call 13b80a8 2416->2419 2420 13bef8a-13bef8e 2417->2420 2421 13bef98-13bef9c 2417->2421 2419->2417 2420->2421 2423 13bef90-13bef93 call 13b80a8 2420->2423 2424 13befae-13befb5 2421->2424 2425 13bef9e-13befa4 2421->2425 2423->2421 2426 13befcc 2424->2426 2427 13befb7-13befc6 2424->2427 2425->2424 2430 13befcd 2426->2430 2427->2426 2430->2430
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 013BEEBE
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 349958475b5111f4c284223fbd03b0cbd6486e06159ec659a0d8d5b2f4dcb3e0
                                    • Instruction ID: 22f959881c24834006f2381aced85c752dd341db79de182e34985d704b6880e9
                                    • Opcode Fuzzy Hash: 349958475b5111f4c284223fbd03b0cbd6486e06159ec659a0d8d5b2f4dcb3e0
                                    • Instruction Fuzzy Hash: 18917B71D00219CFEB20DF6CC8817EDBBB2BF48314F0485A9E919A7690EB749985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2431 13be9f8-13bea4e 2434 13bea5e-13bea9d WriteProcessMemory 2431->2434 2435 13bea50-13bea5c 2431->2435 2437 13bea9f-13beaa5 2434->2437 2438 13beaa6-13bead6 2434->2438 2435->2434 2437->2438
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 013BEA90
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 34c5b6d2575ee1d5221ec99a316534028cef85e6ca389782d02f5e47d3e29f8f
                                    • Instruction ID: 6b20082ce2b2247fb661bb0a06f1b440ec7b9b5846733daa8a112351cd162e8b
                                    • Opcode Fuzzy Hash: 34c5b6d2575ee1d5221ec99a316534028cef85e6ca389782d02f5e47d3e29f8f
                                    • Instruction Fuzzy Hash: D92157B59003599FDB10DFAEC885BEEBBF5FF48310F108429EA59A7240D7789944CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2442 13bea00-13bea4e 2444 13bea5e-13bea9d WriteProcessMemory 2442->2444 2445 13bea50-13bea5c 2442->2445 2447 13bea9f-13beaa5 2444->2447 2448 13beaa6-13bead6 2444->2448 2445->2444 2447->2448
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 013BEA90
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: a3d8219642dbe7e2a174e735e608c70484d55618d0360421de4fd733d2e87a6f
                                    • Instruction ID: 0470db66e9c02ad017358fb490d3c600ce3dc1746e385e33156c818558375f64
                                    • Opcode Fuzzy Hash: a3d8219642dbe7e2a174e735e608c70484d55618d0360421de4fd733d2e87a6f
                                    • Instruction Fuzzy Hash: 412127B59003499FDB10DFAEC885BEEBBF5FF48310F108429E919A7240D7789944CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2452 13be860-13be8b3 2455 13be8c3-13be8c6 2452->2455 2456 13be8b5-13be8c1 2452->2456 2457 13be8cd-13be8f3 Wow64SetThreadContext 2455->2457 2456->2455 2458 13be8fc-13be92c 2457->2458 2459 13be8f5-13be8fb 2457->2459 2459->2458
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 013BE8E6
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: fa43b3e3998c740097f91a80f1f3886b29ed47cbff5bf459cb8b8c901da58b82
                                    • Instruction ID: 1e160e9e36c0cbbb6788725f62a202333fff49fa00bff78c3fefe5cddc24d669
                                    • Opcode Fuzzy Hash: fa43b3e3998c740097f91a80f1f3886b29ed47cbff5bf459cb8b8c901da58b82
                                    • Instruction Fuzzy Hash: 76212571D002098FDB10EFAEC885BEEBFF4EF48314F148429D559A7241DB789945CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2463 13beaea-13beb7d ReadProcessMemory 2467 13beb7f-13beb85 2463->2467 2468 13beb86-13bebb6 2463->2468 2467->2468
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 013BEB70
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 697370af46460c4d40a02e0a594f2ce12a6c9c15d377e151c0427a8d6b6563bc
                                    • Instruction ID: af89fe11cd8f2c71df388e4153f93925bdc80c79531817a745f9f82624d45207
                                    • Opcode Fuzzy Hash: 697370af46460c4d40a02e0a594f2ce12a6c9c15d377e151c0427a8d6b6563bc
                                    • Instruction Fuzzy Hash: 3D2125B1C003599FCB10DFAAC885AEEFBF5FF48320F50842AE559A7250D7389945CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2472 13be868-13be8b3 2474 13be8c3-13be8f3 Wow64SetThreadContext 2472->2474 2475 13be8b5-13be8c1 2472->2475 2477 13be8fc-13be92c 2474->2477 2478 13be8f5-13be8fb 2474->2478 2475->2474 2478->2477
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 013BE8E6
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: b064c4bfe0ac812d25b4349713a5668d3acd6f14d620fb56c9a5ec2c4c3b83e9
                                    • Instruction ID: ced8753e1c445b343483e3bc579c330685babcdaafe96685eeaaf1bdbb0adb8b
                                    • Opcode Fuzzy Hash: b064c4bfe0ac812d25b4349713a5668d3acd6f14d620fb56c9a5ec2c4c3b83e9
                                    • Instruction Fuzzy Hash: 012123B1D002098FDB10DFAEC485BEEBFF4EF48324F14842AD519A7240DB78A945CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2482 13beaf0-13beb7d ReadProcessMemory 2485 13beb7f-13beb85 2482->2485 2486 13beb86-13bebb6 2482->2486 2485->2486
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 013BEB70
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 46bd1dd12fe843ce1f961265824cb522a29b8a23284cf3d2d121f6c666bc35fc
                                    • Instruction ID: 6833a8f00f0e0221c92790995e524ebe79fcb56c650b628c2cee6cc0c59cc01c
                                    • Opcode Fuzzy Hash: 46bd1dd12fe843ce1f961265824cb522a29b8a23284cf3d2d121f6c666bc35fc
                                    • Instruction Fuzzy Hash: 6C2107B1C003499FDB10DFAAC985AEEFBF5FF48320F50842AE559A7250D7789944DBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2490 13bd528-13bd577 2492 13bd579-13bd581 2490->2492 2493 13bd583-13bd5b5 EnumWindows 2490->2493 2492->2493 2496 13bd5be-13bd5eb 2493->2496 2497 13bd5b7-13bd5bd 2493->2497 2497->2496
                                    APIs
                                    • EnumWindows.USER32(00000000,?), ref: 013BD5A8
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: EnumWindows
                                    • String ID:
                                    • API String ID: 1129996299-0
                                    • Opcode ID: e6bdd8c7c53fc0bd0e3527b98288d9b2e665dd9ee0a0dc5af02a20fb3454951f
                                    • Instruction ID: 7cfc062592aa8ad5a8db22883c6ae9687cbb74ea06c57524b49099a8c90a869f
                                    • Opcode Fuzzy Hash: e6bdd8c7c53fc0bd0e3527b98288d9b2e665dd9ee0a0dc5af02a20fb3454951f
                                    • Instruction Fuzzy Hash: 742135B1D002098FDB10DFAAC9457EEFBF5AF88314F10842AD515A7290CB399945CFA0
                                    APIs
                                    • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 013BD2B6
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: b1151c2473f3335ab5c7aa31a2f2906347acdd13b90793f89f06e2fd45bb8bdb
                                    • Instruction ID: 3b84d0f24284194ac7bf3b1224c06bba8c0636b825a075c393293db193c1e3d4
                                    • Opcode Fuzzy Hash: b1151c2473f3335ab5c7aa31a2f2906347acdd13b90793f89f06e2fd45bb8bdb
                                    • Instruction Fuzzy Hash: 091136B1D002488EDB20DFAAC4856EEFBF4FF48324F10842AD459A7210CB799945CFA0
                                    APIs
                                    • EnumWindows.USER32(00000000,?), ref: 013BD5A8
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: EnumWindows
                                    • String ID:
                                    • API String ID: 1129996299-0
                                    • Opcode ID: 068cd75faab473895e58c032f1592fb85336ca1bcadd886dc06eeca27788b516
                                    • Instruction ID: f76abec31f6133b8311035a7bd7bee109c25d300a723bb5e78da00e45bef0777
                                    • Opcode Fuzzy Hash: 068cd75faab473895e58c032f1592fb85336ca1bcadd886dc06eeca27788b516
                                    • Instruction Fuzzy Hash: C7212771D002098FDB14DFAAC9457EEFBF5EF88314F10842AD515A7250CB79A945CFA0
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 013B0D83
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 01258670ae11684e68c6608f4edab0ab4c7cfc5050a94e2f7e84ad1dd448bbc0
                                    • Instruction ID: 831292d4b6734f92830b0bdb068358cd2e983e6eda90e5af8a92e44ed95a81e2
                                    • Opcode Fuzzy Hash: 01258670ae11684e68c6608f4edab0ab4c7cfc5050a94e2f7e84ad1dd448bbc0
                                    • Instruction Fuzzy Hash: FA21E0B59003499FCB10DFAAC984BDEFBF4FB48320F508029E958A7650D378A544CFA1
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 013BE9AE
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 42a602aef97195c6b05c4e75c330f4f15c79f59dc230ea27527e8ad2268178bc
                                    • Instruction ID: 5c302f3c151314ee0fdc16ac4427c002c300ab2013b74fb389269be13a3fc944
                                    • Opcode Fuzzy Hash: 42a602aef97195c6b05c4e75c330f4f15c79f59dc230ea27527e8ad2268178bc
                                    • Instruction Fuzzy Hash: 831159719002499FCB10DFAAC845AEFBFF5EF48324F108419E659A7250C779A544CBA0
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 013B0D83
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 0687aadd9a8826bd733c7d0fd7eddf5422809532135f2b036a1a9879aa5991b9
                                    • Instruction ID: bce99efb03b06fb26e19c71b6fa4719f30dce2bfce0d24caa4be5473abda8216
                                    • Opcode Fuzzy Hash: 0687aadd9a8826bd733c7d0fd7eddf5422809532135f2b036a1a9879aa5991b9
                                    • Instruction Fuzzy Hash: 6A21D3B59002499FCB10DF9AC985BDEFBF4FB48320F108429E958A7250D778A544CFA1
                                    APIs
                                    • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 013BD2B6
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: 8eadcb87dcf3b99fba618d602b6792d1835fb61461efd44e4fdd24e854c80546
                                    • Instruction ID: d528d9a58d58eaee5dae70992aaef78ccd0af5d4be3134b4105743263a5ab653
                                    • Opcode Fuzzy Hash: 8eadcb87dcf3b99fba618d602b6792d1835fb61461efd44e4fdd24e854c80546
                                    • Instruction Fuzzy Hash: F51114B1D002498FDB10DFAAC485AEEFBF4EF48324F50842AD519A7240CB78A944CFA0
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 013BE9AE
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: c0012e54604b375608bb83b38878424d3be832f63d2e71ad5d3719ec856f2741
                                    • Instruction ID: 8ecb16a6cfb70f89b5c9ca1381b5d9d87326c78103502e3f9c6eb4d3fb789cd4
                                    • Opcode Fuzzy Hash: c0012e54604b375608bb83b38878424d3be832f63d2e71ad5d3719ec856f2741
                                    • Instruction Fuzzy Hash: 4E1137759002499FDB10DFAAC845AEFBFF5EF48324F108419E519A7250CB79A544CFA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: e4e6141aa0df61e0a3b14dd5b3d0d429fffdd350f7e68857ee1f67ade925c9a9
                                    • Instruction ID: 3ab011c2739ab1cfa4030bdfe348d6b5871191f5d8b2c76e37a9e5e7aef21527
                                    • Opcode Fuzzy Hash: e4e6141aa0df61e0a3b14dd5b3d0d429fffdd350f7e68857ee1f67ade925c9a9
                                    • Instruction Fuzzy Hash: EB1149B1D002488BCB10DFAEC8457EEFFF4EF48724F248419D519A7240C738A544CB94
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 2541423660b191d5f4c89ae70519071dfc46a2be2ee88f0a257138fb1f7a518f
                                    • Instruction ID: 88ef9df1f69066691dadb191dbcfb40acd59b47a849a253878fc2ff7f5d4e927
                                    • Opcode Fuzzy Hash: 2541423660b191d5f4c89ae70519071dfc46a2be2ee88f0a257138fb1f7a518f
                                    • Instruction Fuzzy Hash: F11128B5D002488BDB24DFAEC4457EEFFF5EF88724F148429D519A7240CB79A544CBA4
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 013BD367
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 1f669061853f9671304bbd9f06bc7a16b646eaf02f9e21660e14890b7751be05
                                    • Instruction ID: 177b0e87152f99ecfe35f364780a546c5f00e79c2f9e50dd36d9eb16d7d9312d
                                    • Opcode Fuzzy Hash: 1f669061853f9671304bbd9f06bc7a16b646eaf02f9e21660e14890b7751be05
                                    • Instruction Fuzzy Hash: C31103B5800248CFCB10DF9AD485BEEBBF4EF48314F20845AD518A7650C379A944CFA5
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 013BD367
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3339018320.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_13b0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: e3c350fbced808eeaccb6491d9395c95981fc17823cd759d4d506a8e86c93568
                                    • Instruction ID: 2c0d2dd6f8a2ad4916978f06c834d975530ddb8d2762fec966188938f1f45bcb
                                    • Opcode Fuzzy Hash: e3c350fbced808eeaccb6491d9395c95981fc17823cd759d4d506a8e86c93568
                                    • Instruction Fuzzy Hash: FF1115B5800349CFCB20EF9AD585BDEFBF8EB48314F20845AD619A7641D378A944CFA5
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3338229469.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_134d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 70e4336df2d6b87888b581ffabaebd9f6042e56d986a89da8d910c007236c668
                                    • Instruction ID: b13d61c69d6cf78f68d56dbf91979856282cee645d5886b01ee71c857dcffeef
                                    • Opcode Fuzzy Hash: 70e4336df2d6b87888b581ffabaebd9f6042e56d986a89da8d910c007236c668
                                    • Instruction Fuzzy Hash: 932104706042449FDB15DF68C5C4B26BBE9FBA4358F20C56DE90A4B352C33AE807C662
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3338229469.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_134d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3651e3712e73432ae0097ed437d1121b0f28402f8db422d76e9e6eee12d04935
                                    • Instruction ID: 8332dcb249b7c49c2353531a3bf0dc4b6a986fe5ca5b2b7419a64807a1affcb7
                                    • Opcode Fuzzy Hash: 3651e3712e73432ae0097ed437d1121b0f28402f8db422d76e9e6eee12d04935
                                    • Instruction Fuzzy Hash: 2321C3715083C08FC707CF24C994715BFB1FB56218F28C5EAD8498B6A3C33A980ACB62

                                    Execution Graph

                                    Execution Coverage:12.6%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:236
                                    Total number of Limit Nodes:33
                                    execution_graph 25507 275f9f0 25508 275fa58 CreateWindowExW 25507->25508 25510 275fb14 25508->25510 25529 2757460 25530 27574a6 GetCurrentProcess 25529->25530 25532 27574f1 25530->25532 25533 27574f8 GetCurrentThread 25530->25533 25532->25533 25534 2757535 GetCurrentProcess 25533->25534 25535 275752e 25533->25535 25536 275756b 25534->25536 25535->25534 25537 2757593 GetCurrentThreadId 25536->25537 25538 27575c4 25537->25538 25539 2756ca0 25543 2756d97 25539->25543 25548 2756cd0 25539->25548 25540 2756cb0 25544 2756d9c 25543->25544 25545 2756e01 25544->25545 25553 2756f40 25544->25553 25557 2756f33 25544->25557 25545->25540 25549 2756d0a 25548->25549 25550 2756e01 25549->25550 25551 2756f40 7 API calls 25549->25551 25552 2756f33 7 API calls 25549->25552 25550->25540 25551->25550 25552->25550 25554 2756f4d 25553->25554 25555 2756f87 25554->25555 25561 2756a70 25554->25561 25555->25545 25558 2756f4d 25557->25558 25559 2756f87 25558->25559 25560 2756a70 7 API calls 25558->25560 25559->25545 25560->25559 25562 2756a75 25561->25562 25564 2757ca0 25562->25564 25565 2757124 25562->25565 25566 275712f 25565->25566 25581 275b464 25566->25581 25586 275b260 25566->25586 25597 275ae28 25566->25597 25611 275b088 25566->25611 25623 275ad00 25566->25623 25637 275ad10 25566->25637 25567 2757d1e 25651 2757154 25567->25651 25569 2757d38 25656 2757164 25569->25656 25572 2757d49 25572->25564 25583 275b481 25581->25583 25582 275b56a 25583->25582 25674 275bf18 25583->25674 25680 275bf08 25583->25680 25588 275b28e 25586->25588 25587 275b2b7 25590 275b35f 25587->25590 25592 275b35a KiUserCallbackDispatcher 25587->25592 25594 275b3cb 25587->25594 25588->25587 25593 275b56a 25588->25593 25686 2759fc4 GetFocus 25588->25686 25591 2757164 3 API calls 25590->25591 25590->25594 25591->25594 25592->25590 25594->25593 25595 275bf18 3 API calls 25594->25595 25596 275bf08 3 API calls 25594->25596 25595->25593 25596->25593 25599 275ae4a 25597->25599 25600 275aeb0 25597->25600 25598 275ae28 2 API calls 25601 275b0b7 25598->25601 25599->25598 25599->25600 25600->25567 25604 275b2b7 25601->25604 25606 275b20a 25601->25606 25687 2759fc4 GetFocus 25601->25687 25603 275b35f 25605 2757164 2 API calls 25603->25605 25608 275b3cb 25603->25608 25604->25603 25607 275b35a KiUserCallbackDispatcher 25604->25607 25604->25608 25605->25608 25606->25567 25607->25603 25608->25606 25609 275bf18 2 API calls 25608->25609 25610 275bf08 2 API calls 25608->25610 25609->25606 25610->25606 25612 275ae28 3 API calls 25611->25612 25613 275b0b7 25611->25613 25612->25613 25616 275b2b7 25613->25616 25618 275b20a 25613->25618 25688 2759fc4 GetFocus 25613->25688 25615 275b35f 25617 2757164 3 API calls 25615->25617 25620 275b3cb 25615->25620 25616->25615 25619 275b35a KiUserCallbackDispatcher 25616->25619 25616->25620 25617->25620 25618->25567 25619->25615 25620->25618 25621 275bf18 3 API calls 25620->25621 25622 275bf08 3 API calls 25620->25622 25621->25618 25622->25618 25624 275ad48 25623->25624 25625 275ae28 3 API calls 25624->25625 25626 275ad9d 25624->25626 25627 275b0b7 25625->25627 25626->25567 25630 275b2b7 25627->25630 25632 275b20a 25627->25632 25689 2759fc4 GetFocus 25627->25689 25629 275b35f 25631 2757164 3 API calls 25629->25631 25634 275b3cb 25629->25634 25630->25629 25633 275b35a KiUserCallbackDispatcher 25630->25633 25630->25634 25631->25634 25632->25567 25633->25629 25634->25632 25635 275bf18 3 API calls 25634->25635 25636 275bf08 3 API calls 25634->25636 25635->25632 25636->25632 25638 275ad48 25637->25638 25639 275ae28 2 API calls 25638->25639 25640 275ad9d 25638->25640 25641 275b0b7 25639->25641 25640->25567 25643 275b20a 25641->25643 25644 275b2b7 25641->25644 25690 2759fc4 GetFocus 25641->25690 25643->25567 25645 275b35f 25644->25645 25647 275b35a KiUserCallbackDispatcher 25644->25647 25648 275b3cb 25644->25648 25646 2757164 2 API calls 25645->25646 25645->25648 25646->25648 25647->25645 25648->25643 25649 275bf18 2 API calls 25648->25649 25650 275bf08 2 API calls 25648->25650 25649->25643 25650->25643 25653 275715f 25651->25653 25655 275c7b1 25653->25655 25691 275c0b8 25653->25691 25654 275c7ac 25654->25569 25655->25569 25657 275716f 25656->25657 25658 275ce6f 25657->25658 25695 275c1bc 25657->25695 25660 275ad10 3 API calls 25658->25660 25661 2757d3f 25660->25661 25662 275d040 25661->25662 25668 275d028 25661->25668 25664 275d0be 25662->25664 25665 275d071 25662->25665 25663 275d07d 25663->25572 25664->25572 25665->25663 25701 275d3a8 25665->25701 25704 275d398 25665->25704 25670 275d071 25668->25670 25671 275d0be 25668->25671 25669 275d07d 25669->25572 25670->25669 25672 275d3a8 GetModuleHandleW 25670->25672 25673 275d398 GetModuleHandleW 25670->25673 25671->25572 25672->25671 25673->25671 25675 275bf35 25674->25675 25676 275bf79 25675->25676 25677 2757164 3 API calls 25675->25677 25678 275ad10 3 API calls 25676->25678 25677->25676 25679 275bfe6 25678->25679 25679->25582 25681 275bf35 25680->25681 25682 275bf79 25681->25682 25683 2757164 3 API calls 25681->25683 25684 275ad10 3 API calls 25682->25684 25683->25682 25685 275bfe6 25684->25685 25685->25582 25686->25587 25687->25604 25688->25616 25689->25630 25690->25644 25692 275c0c3 25691->25692 25693 275c995 25692->25693 25694 2757164 3 API calls 25692->25694 25693->25654 25694->25693 25696 275c1c7 25695->25696 25697 275ad10 3 API calls 25696->25697 25698 275cfe1 25696->25698 25699 275cf5f 25697->25699 25698->25658 25699->25698 25700 275c1bc 3 API calls 25699->25700 25700->25699 25707 275d3e8 25701->25707 25702 275d3b2 25702->25664 25705 275d3b2 25704->25705 25706 275d3e8 GetModuleHandleW 25704->25706 25705->25664 25706->25705 25708 275d42c 25707->25708 25709 275d409 25707->25709 25708->25702 25709->25708 25710 275d630 GetModuleHandleW 25709->25710 25711 275d65d 25710->25711 25711->25702 25770 275fd00 25771 275ad10 3 API calls 25770->25771 25772 275fd33 25771->25772 25773 275fd53 25772->25773 25776 275fdc6 25772->25776 25774 275ad10 3 API calls 25773->25774 25778 275fd6d 25774->25778 25775 275fdb6 25777 275fdcd 25776->25777 25779 275ad10 3 API calls 25776->25779 25778->25775 25782 275b088 4 API calls 25778->25782 25780 275fe10 25779->25780 25781 275fe6c 25780->25781 25783 275fe33 25780->25783 25784 275b088 4 API calls 25781->25784 25782->25775 25785 275ad10 3 API calls 25783->25785 25787 275fe4d 25784->25787 25785->25787 25786 275feaf 25787->25786 25788 275b088 4 API calls 25787->25788 25788->25786 25511 8ee1f68 25514 8ee1fcd 25511->25514 25512 8ee2430 WaitMessage 25512->25514 25513 8ee201a 25514->25512 25514->25513 25519 8ee2528 PeekMessageW 25514->25519 25521 8ee2530 PeekMessageW 25514->25521 25523 8ee3029 DispatchMessageW 25514->25523 25525 8ee3030 DispatchMessageW 25514->25525 25520 8ee25a7 25519->25520 25520->25514 25522 8ee25a7 25521->25522 25522->25514 25524 8ee309c 25523->25524 25524->25514 25526 8ee309c 25525->25526 25526->25514 25527 275fc38 SetWindowLongW 25528 275fca4 25527->25528 25712 27576a8 DuplicateHandle 25713 275773e 25712->25713 25714 903209e 25716 90320c2 25714->25716 25715 90320c9 25716->25715 25719 9032758 25716->25719 25721 90327b6 CreateProcessA 25719->25721 25722 9032958 25721->25722 25723 8ee7c30 25725 8ee7c33 25723->25725 25726 8ee7bf9 25723->25726 25724 8ee7c78 25725->25724 25729 8ee0b30 25725->25729 25736 8ee0b2c 25725->25736 25730 8ee0b57 25729->25730 25743 8ee0ecf 25730->25743 25748 8ee0ef3 25730->25748 25753 8ee0c88 25730->25753 25757 8ee0c7c 25730->25757 25731 8ee0b7b 25737 8ee0b57 25736->25737 25739 8ee0ecf 2 API calls 25737->25739 25740 8ee0c7c GetCurrentThreadId 25737->25740 25741 8ee0c88 GetCurrentThreadId 25737->25741 25742 8ee0ef3 2 API calls 25737->25742 25738 8ee0b7b 25738->25738 25739->25738 25740->25738 25741->25738 25742->25738 25744 8ee0ef4 25743->25744 25745 8ee0ed5 25743->25745 25761 8ee111e PostMessageW 25744->25761 25763 8ee1120 PostMessageW 25744->25763 25745->25731 25749 8ee0f06 25748->25749 25751 8ee111e PostMessageW 25749->25751 25752 8ee1120 PostMessageW 25749->25752 25750 8ee0f29 25750->25731 25751->25750 25752->25750 25754 8ee0ce2 25753->25754 25755 8ee0d67 GetCurrentThreadId 25754->25755 25756 8ee0d97 25754->25756 25755->25756 25756->25731 25758 8ee0ce2 25757->25758 25759 8ee0d97 25758->25759 25760 8ee0d67 GetCurrentThreadId 25758->25760 25759->25731 25760->25759 25762 8ee118c 25761->25762 25762->25745 25764 8ee118c 25763->25764 25764->25745 25765 8ee7c40 25766 8ee7c78 25765->25766 25767 8ee7c4f 25765->25767 25768 8ee0b2c 4 API calls 25767->25768 25769 8ee0b30 4 API calls 25767->25769 25768->25766 25769->25766

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 904 8ee1f68-8ee1fcb 905 8ee1fcd-8ee1ff7 904->905 906 8ee1ffa-8ee2018 904->906 905->906 911 8ee201a-8ee201c 906->911 912 8ee2021-8ee2058 906->912 913 8ee24da-8ee24ef 911->913 916 8ee205e-8ee2072 912->916 917 8ee2489 912->917 918 8ee2074-8ee209e 916->918 919 8ee20a1-8ee20c0 916->919 920 8ee248e-8ee24a4 917->920 918->919 926 8ee20d8-8ee20da 919->926 927 8ee20c2-8ee20c8 919->927 920->913 931 8ee20dc-8ee20f4 926->931 932 8ee20f9-8ee2102 926->932 929 8ee20cc-8ee20ce 927->929 930 8ee20ca 927->930 929->926 930->926 931->920 933 8ee210a-8ee2111 932->933 934 8ee211b-8ee2122 933->934 935 8ee2113-8ee2119 933->935 937 8ee212c 934->937 938 8ee2124-8ee212a 934->938 936 8ee212f-8ee2143 935->936 1007 8ee2145 call 8ee2528 936->1007 1008 8ee2145 call 8ee2530 936->1008 937->936 938->936 939 8ee214a-8ee214c 940 8ee2152-8ee2159 939->940 941 8ee22a1-8ee22a5 939->941 940->917 942 8ee215f-8ee219c 940->942 943 8ee22ab-8ee22af 941->943 944 8ee2474-8ee2487 941->944 952 8ee246a-8ee246e 942->952 953 8ee21a2-8ee21a7 942->953 945 8ee22c9-8ee22d2 943->945 946 8ee22b1-8ee22c4 943->946 944->920 947 8ee22d4-8ee22fe 945->947 948 8ee2301-8ee2308 945->948 946->920 947->948 950 8ee230e-8ee2315 948->950 951 8ee23a7-8ee23bc 948->951 955 8ee2317-8ee2341 950->955 956 8ee2344-8ee2366 950->956 951->952 963 8ee23c2-8ee23c4 951->963 952->933 952->944 957 8ee21d9-8ee21ec 953->957 958 8ee21a9-8ee21b7 953->958 955->956 956->951 987 8ee2368-8ee2372 956->987 961 8ee21f3-8ee21f7 957->961 958->957 970 8ee21b9-8ee21d7 958->970 966 8ee2268-8ee2275 961->966 967 8ee21f9-8ee220b 961->967 968 8ee23c6-8ee23ff 963->968 969 8ee2411-8ee242e 963->969 966->952 980 8ee227b-8ee2285 966->980 990 8ee220d-8ee223d 967->990 991 8ee224b-8ee2263 967->991 982 8ee2408-8ee240f 968->982 983 8ee2401-8ee2407 968->983 969->952 979 8ee2430-8ee245c WaitMessage 969->979 970->961 985 8ee245e 979->985 986 8ee2463 979->986 993 8ee2287 980->993 994 8ee2294-8ee229c 980->994 982->952 983->982 985->986 986->952 996 8ee238a-8ee23a5 987->996 997 8ee2374-8ee237a 987->997 1003 8ee223f 990->1003 1004 8ee2244 990->1004 991->920 1009 8ee228a call 8ee3029 993->1009 1010 8ee228a call 8ee3030 993->1010 994->952 996->951 996->987 1001 8ee237e-8ee2380 997->1001 1002 8ee237c 997->1002 999 8ee228f 999->952 1001->996 1002->996 1003->1004 1004->991 1007->939 1008->939 1009->999 1010->999
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2715302620.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8ee0000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 42d33c1221aaf07bc49601e7ba3171433eeee0cbd0c1fd5a63f938a7274dc7fa
                                    • Instruction ID: 165bc24b46351418a27a859436c00fe3008727784026eb3e31c7299c49b7f019
                                    • Opcode Fuzzy Hash: 42d33c1221aaf07bc49601e7ba3171433eeee0cbd0c1fd5a63f938a7274dc7fa
                                    • Instruction Fuzzy Hash: 20F16B31A00309CFDB14DFA9C988BADBBF5FF88305F148169F509AB2A5DB74A945CB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 358 2757451-27574ef GetCurrentProcess 362 27574f1-27574f7 358->362 363 27574f8-275752c GetCurrentThread 358->363 362->363 364 2757535-2757569 GetCurrentProcess 363->364 365 275752e-2757534 363->365 367 2757572-275758d call 2757630 364->367 368 275756b-2757571 364->368 365->364 370 2757593-27575c2 GetCurrentThreadId 367->370 368->367 372 27575c4-27575ca 370->372 373 27575cb-275762d 370->373 372->373
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 027574DE
                                    • GetCurrentThread.KERNEL32 ref: 0275751B
                                    • GetCurrentProcess.KERNEL32 ref: 02757558
                                    • GetCurrentThreadId.KERNEL32 ref: 027575B1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708790406.0000000002750000.00000040.00000800.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_2750000_Windows Update.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 7d512fbcf71672b5cf96031781b7bf356c4e38b8cf9254282b6c0ca957453990
                                    • Instruction ID: a03d1408909e2103967e7f7ed1bc9b996b3bea3a8b3b613efd576be61260bb49
                                    • Opcode Fuzzy Hash: 7d512fbcf71672b5cf96031781b7bf356c4e38b8cf9254282b6c0ca957453990
                                    • Instruction Fuzzy Hash: E65144B0A003498FDB14DFA9D648BAEFBF1FF48314F208499E809A7261D7799945CB61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 380 2757460-27574ef GetCurrentProcess 384 27574f1-27574f7 380->384 385 27574f8-275752c GetCurrentThread 380->385 384->385 386 2757535-2757569 GetCurrentProcess 385->386 387 275752e-2757534 385->387 389 2757572-275758d call 2757630 386->389 390 275756b-2757571 386->390 387->386 392 2757593-27575c2 GetCurrentThreadId 389->392 390->389 394 27575c4-27575ca 392->394 395 27575cb-275762d 392->395 394->395
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 027574DE
                                    • GetCurrentThread.KERNEL32 ref: 0275751B
                                    • GetCurrentProcess.KERNEL32 ref: 02757558
                                    • GetCurrentThreadId.KERNEL32 ref: 027575B1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708790406.0000000002750000.00000040.00000800.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_2750000_Windows Update.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: bbee2a230218edfff19b9ef6474d6e74a85f1bd1f5137deedc2f9d68780b87dc
                                    • Instruction ID: d32dd707c22f829ba09108a1b33609b5d4cb4a7072320afdb533c29167cc4aec
                                    • Opcode Fuzzy Hash: bbee2a230218edfff19b9ef6474d6e74a85f1bd1f5137deedc2f9d68780b87dc
                                    • Instruction Fuzzy Hash: 905157B09003498FDB18DFA9D548BAEFBF5FF48314F208459E409A7360D7799944CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1011 8ee0c88-8ee0cec 1014 8ee0f7a-8ee1046 1011->1014 1015 8ee0cf2-8ee0d0a 1011->1015 1039 8ee104f-8ee1063 1014->1039 1040 8ee1048-8ee104e 1014->1040 1020 8ee0d0c-8ee0d12 1015->1020 1021 8ee0d22-8ee0d24 1015->1021 1022 8ee0d16-8ee0d18 1020->1022 1023 8ee0d14 1020->1023 1025 8ee0d26-8ee0d2d 1021->1025 1026 8ee0d34-8ee0d95 GetCurrentThreadId 1021->1026 1022->1021 1023->1021 1025->1026 1034 8ee0d9e-8ee0da7 1026->1034 1035 8ee0d97-8ee0d9d 1026->1035 1037 8ee0db8-8ee0dbe 1034->1037 1038 8ee0da9-8ee0daf 1034->1038 1035->1034 1043 8ee0dc7-8ee0e0d 1037->1043 1044 8ee0dc0 1037->1044 1038->1037 1042 8ee0db1 1038->1042 1040->1039 1042->1037 1050 8ee0e0f-8ee0e25 1043->1050 1051 8ee0e2d-8ee0e48 1043->1051 1045 8ee0dc5 1044->1045 1045->1043 1050->1051 1053 8ee0e4a 1051->1053 1054 8ee0e52 1051->1054 1053->1054 1054->1014
                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 08EE0D81
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2715302620.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8ee0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: CurrentThread
                                    • String ID:
                                    • API String ID: 2882836952-0
                                    • Opcode ID: bc9ae91764bd35c1674afd058f2dcc266637f2a679fdcfa4e17b274e965fc962
                                    • Instruction ID: 510ac6cd0c1698012c0518182f6c4438c8f73fce4455e37993c1adb2efb89b31
                                    • Opcode Fuzzy Hash: bc9ae91764bd35c1674afd058f2dcc266637f2a679fdcfa4e17b274e965fc962
                                    • Instruction Fuzzy Hash: 35815A71D003588FCB15DFA9C4546DEBFF5FF49310F14842AE415AB261DB74A845CB60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1255 9032758-90327c2 1257 90327c4-90327ce 1255->1257 1258 90327fb-903281b 1255->1258 1257->1258 1259 90327d0-90327d2 1257->1259 1265 9032854-9032882 1258->1265 1266 903281d-9032827 1258->1266 1260 90327f5-90327f8 1259->1260 1261 90327d4-90327de 1259->1261 1260->1258 1263 90327e2-90327f1 1261->1263 1264 90327e0 1261->1264 1263->1263 1267 90327f3 1263->1267 1264->1263 1272 9032884-903288e 1265->1272 1273 90328bb-90328da 1265->1273 1266->1265 1268 9032829-903282b 1266->1268 1267->1260 1270 903284e-9032851 1268->1270 1271 903282d-9032837 1268->1271 1270->1265 1274 903283b-903284a 1271->1274 1275 9032839 1271->1275 1272->1273 1277 9032890-9032892 1272->1277 1283 90328ea-90328f7 1273->1283 1284 90328dc-90328e8 1273->1284 1274->1274 1276 903284c 1274->1276 1275->1274 1276->1270 1278 90328b5-90328b8 1277->1278 1279 9032894-903289e 1277->1279 1278->1273 1281 90328a2-90328b1 1279->1281 1282 90328a0 1279->1282 1281->1281 1287 90328b3 1281->1287 1282->1281 1285 9032907-9032956 CreateProcessA 1283->1285 1286 90328f9-9032905 1283->1286 1284->1283 1288 9032958-903295e 1285->1288 1289 903295f-903299f 1285->1289 1286->1285 1287->1278 1288->1289 1293 90329a1-90329a5 1289->1293 1294 90329af-90329b3 1289->1294 1293->1294 1295 90329a7 1293->1295 1296 90329c3-90329c7 1294->1296 1297 90329b5-90329b9 1294->1297 1295->1294 1299 90329d7 1296->1299 1300 90329c9-90329cd 1296->1300 1297->1296 1298 90329bb 1297->1298 1298->1296 1302 90329d8 1299->1302 1300->1299 1301 90329cf 1300->1301 1301->1299 1302->1302
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,00000000,00000000), ref: 09032946
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2715578800.0000000009030000.00000040.00000800.00020000.00000000.sdmp, Offset: 09030000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_9030000_Windows Update.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 5a968260ed2532ca8db1630c929fa4ffd90273454c81c04af8e0d2a095d25df6
                                    • Instruction ID: 41a1e31349cf4aecfc2adbf246e9208e3c3695c9e1baa6adaca71aaf4a5b2dfe
                                    • Opcode Fuzzy Hash: 5a968260ed2532ca8db1630c929fa4ffd90273454c81c04af8e0d2a095d25df6
                                    • Instruction Fuzzy Hash: C5815771D006199FDB10CFADC8857AEBBF5FF48310F548629E868E7290D7748881CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1196 275d3e8-275d407 1197 275d433-275d437 1196->1197 1198 275d409-275d416 call 275c294 1196->1198 1200 275d439-275d443 1197->1200 1201 275d44b-275d48c 1197->1201 1204 275d42c 1198->1204 1205 275d418 1198->1205 1200->1201 1207 275d48e-275d496 1201->1207 1208 275d499-275d4a7 1201->1208 1204->1197 1253 275d41e call 275d690 1205->1253 1254 275d41e call 275d683 1205->1254 1207->1208 1209 275d4a9-275d4ae 1208->1209 1210 275d4cb-275d4cd 1208->1210 1212 275d4b0-275d4b7 call 275c2a0 1209->1212 1213 275d4b9 1209->1213 1215 275d4d0-275d4d7 1210->1215 1211 275d424-275d426 1211->1204 1214 275d568-275d5e6 1211->1214 1217 275d4bb-275d4c9 1212->1217 1213->1217 1246 275d5ec-275d628 1214->1246 1247 275d5e8-275d5eb 1214->1247 1218 275d4e4-275d4eb 1215->1218 1219 275d4d9-275d4e1 1215->1219 1217->1215 1222 275d4ed-275d4f5 1218->1222 1223 275d4f8-275d501 call 275c2b0 1218->1223 1219->1218 1222->1223 1227 275d503-275d50b 1223->1227 1228 275d50e-275d513 1223->1228 1227->1228 1229 275d515-275d51c 1228->1229 1230 275d531-275d53e 1228->1230 1229->1230 1232 275d51e-275d52e call 275c068 call 275c2c0 1229->1232 1237 275d561-275d567 1230->1237 1238 275d540-275d55e 1230->1238 1232->1230 1238->1237 1248 275d630-275d65b GetModuleHandleW 1246->1248 1249 275d62a-275d62d 1246->1249 1247->1246 1250 275d664-275d678 1248->1250 1251 275d65d-275d663 1248->1251 1249->1248 1251->1250 1253->1211 1254->1211
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0275D64E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708790406.0000000002750000.00000040.00000800.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_2750000_Windows Update.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 524736ac895781ab42a8044cb008d810c642029e345a614e6b50ae23bbc00d3e
                                    • Instruction ID: 8c1b4ad8417579a888a188d7b027a9b61e705108890ed152437a0ed7f6f6bcaa
                                    • Opcode Fuzzy Hash: 524736ac895781ab42a8044cb008d810c642029e345a614e6b50ae23bbc00d3e
                                    • Instruction Fuzzy Hash: 07814670A00B158FDB24DF69D44476ABBF2FF88704F00892ED88AD7A50D7B5E946CB91
                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 08EE0D81
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2715302620.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8ee0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: CurrentThread
                                    • String ID:
                                    • API String ID: 2882836952-0
                                    • Opcode ID: 4473edb6b43605855cfd8a39c5b815b7fda25bed399495665e88898a6cdb3ba0
                                    • Instruction ID: 607ddad6765c8c653f35483e708488c91f11efc66d20f5cef7005de249ddf0db
                                    • Opcode Fuzzy Hash: 4473edb6b43605855cfd8a39c5b815b7fda25bed399495665e88898a6cdb3ba0
                                    • Instruction Fuzzy Hash: 4F517A72E00359CFCF15DFA9C854AEDBBB6BF44305F14842EE815AB261DBB4A845CB60
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0275FB02
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708790406.0000000002750000.00000040.00000800.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_2750000_Windows Update.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: c9b61641a531cb14fdbcdafdcad64948f0821b6ce7878dc8333a3e3d6f27bd43
                                    • Instruction ID: 93aa1447f3235e32d7474377e3e780c4dc833956184a9968d5b52e4b2f33b4e9
                                    • Opcode Fuzzy Hash: c9b61641a531cb14fdbcdafdcad64948f0821b6ce7878dc8333a3e3d6f27bd43
                                    • Instruction Fuzzy Hash: A841C0B1D00359DFDB14CFA9C984ADEFBB5BF49314F24812AE819AB210D7749845CF91
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0275772F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708790406.0000000002750000.00000040.00000800.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_2750000_Windows Update.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 4d4a0a31df0a121b419f1adc1af45a8eeb9987279175d599685dce119a56747e
                                    • Instruction ID: cbdf018a8ff9d9b6b807bb6ae37aa4e0f7f9baf7374a4393cbfa5b818eea3bc1
                                    • Opcode Fuzzy Hash: 4d4a0a31df0a121b419f1adc1af45a8eeb9987279175d599685dce119a56747e
                                    • Instruction Fuzzy Hash: 962103B5900249DFDB10CFAAD584ADEFBF5FB08310F24845AE958A3250D378A940CFA1
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0275772F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708790406.0000000002750000.00000040.00000800.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_2750000_Windows Update.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 2e4e03b887f095342ffedbf59815e53ee0f204e26b10f4faf5e6d9b9bf907a08
                                    • Instruction ID: 97b12e9bd4e448138b2e6035e91c5a447acdfd0325a97938bc4eec46b66b31d9
                                    • Opcode Fuzzy Hash: 2e4e03b887f095342ffedbf59815e53ee0f204e26b10f4faf5e6d9b9bf907a08
                                    • Instruction Fuzzy Hash: 8621C2B5D002599FDB10CFAAD984ADEFBF9FB48310F14841AE918A3350D378A944CFA5
                                    APIs
                                    • PeekMessageW.USER32(?,?,?,?,?), ref: 08EE2598
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2715302620.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8ee0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: MessagePeek
                                    • String ID:
                                    • API String ID: 2222842502-0
                                    • Opcode ID: 2894d7bc35566a3ba7a89b8f6838ece44987bc563c1cdbad1e3eb24d5a9be7a8
                                    • Instruction ID: fc769dd079f7f678904daa5f5368ed921a52a5183431d0f7e594d8e80a38031b
                                    • Opcode Fuzzy Hash: 2894d7bc35566a3ba7a89b8f6838ece44987bc563c1cdbad1e3eb24d5a9be7a8
                                    • Instruction Fuzzy Hash: F911E4B68002099FDB10CF99D585BDEBBF8FB08314F10842AE918B3250C378A544DFA1
                                    APIs
                                    • PeekMessageW.USER32(?,?,?,?,?), ref: 08EE2598
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2715302620.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8ee0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: MessagePeek
                                    • String ID:
                                    • API String ID: 2222842502-0
                                    • Opcode ID: 7c3c7dbc2ae6f22c2a809fe6e518bd37c03dd8c50ab1724a0f97db38f5beb8a5
                                    • Instruction ID: b4b1eb7812674616244cc1e48a2fd9bb7781c576e8e059802d349a1325ef4e08
                                    • Opcode Fuzzy Hash: 7c3c7dbc2ae6f22c2a809fe6e518bd37c03dd8c50ab1724a0f97db38f5beb8a5
                                    • Instruction Fuzzy Hash: 7311C6B58002499FDB10DF9AD945BDEBBF8FB48314F10842AE558A3251C378A544DFA5
                                    APIs
                                    • PostMessageW.USER32(?,?,?,?), ref: 08EE117D
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2715302620.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8ee0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: 5713f4d1d6c5c5ad75f1792d9c7e80cff8a0d0a2385bdfd53ca14bd9e742aee7
                                    • Instruction ID: 1cc7ae1c693d55e909315950bd8a8cf08998f0947e8636e024f24e8a28838ea3
                                    • Opcode Fuzzy Hash: 5713f4d1d6c5c5ad75f1792d9c7e80cff8a0d0a2385bdfd53ca14bd9e742aee7
                                    • Instruction Fuzzy Hash: 7611F5B58003499FDB10DF9AC845BEEBBF8EB48320F108419E558A3650D378A584CFA5
                                    APIs
                                    • PostMessageW.USER32(?,?,?,?), ref: 08EE117D
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2715302620.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8ee0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: bc1dacf340b2c60253cd1d4a98f9bdb348838a347d17d22867ca67eb9ce9e7a8
                                    • Instruction ID: 05b05cd937d755d2199ff0fd40d08f2b9cb388744126ea9385119be2fd123df4
                                    • Opcode Fuzzy Hash: bc1dacf340b2c60253cd1d4a98f9bdb348838a347d17d22867ca67eb9ce9e7a8
                                    • Instruction Fuzzy Hash: 04110AB5800349CFDB10CF99C545BEEBBF4FB08311F148419E558A3650D378A584CFA1
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0275D64E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708790406.0000000002750000.00000040.00000800.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_2750000_Windows Update.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 57ab601cc4f5e754d9c919def06797bd4352eb0c43806f64295a886c8f6e34a7
                                    • Instruction ID: e9d552c41c5c1fa45ab78c5de0212cceb249512b8fa524e67ed83a8a645e7d13
                                    • Opcode Fuzzy Hash: 57ab601cc4f5e754d9c919def06797bd4352eb0c43806f64295a886c8f6e34a7
                                    • Instruction Fuzzy Hash: BB11E0B5D007598FCB20DF9AD444ADEFBF4EF88314F10846AD829A7610C3B9A546CFA5
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2715302620.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8ee0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: DispatchMessage
                                    • String ID:
                                    • API String ID: 2061451462-0
                                    • Opcode ID: c155e71c4fc438aff6b95f14c2b019eed436798f1e78f8196ff2f3a6990fc64a
                                    • Instruction ID: fba26e4e96bd9f17373af3c0f4a11d8b9c5eac8667c722588aabde3b682fd06a
                                    • Opcode Fuzzy Hash: c155e71c4fc438aff6b95f14c2b019eed436798f1e78f8196ff2f3a6990fc64a
                                    • Instruction Fuzzy Hash: A111EDB5C006498FCB10DF9AE588BDEBBF4EB48324F10855AE859A7610C378A545CFA5
                                    APIs
                                    • SetWindowLongW.USER32(?,?,?), ref: 0275FC95
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708790406.0000000002750000.00000040.00000800.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_2750000_Windows Update.jbxd
                                    Similarity
                                    • API ID: LongWindow
                                    • String ID:
                                    • API String ID: 1378638983-0
                                    • Opcode ID: e422c35c28d08a3e0edaedc03c6f421a637f677e29a57f9f9bef3a8a961d854d
                                    • Instruction ID: 3e5609202706c6f26a4c47fe4ab38aee0db6b0e1e8111350a52a5bb81cd9c445
                                    • Opcode Fuzzy Hash: e422c35c28d08a3e0edaedc03c6f421a637f677e29a57f9f9bef3a8a961d854d
                                    • Instruction Fuzzy Hash: 7D1103B58002488FDB10DF9AD584BDEFBF8EB48324F10881AD918A3600C378A944CFA5
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2715302620.0000000008EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08EE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8ee0000_Windows Update.jbxd
                                    Similarity
                                    • API ID: DispatchMessage
                                    • String ID:
                                    • API String ID: 2061451462-0
                                    • Opcode ID: f3933903bc7cc711361a48604753c41e02031946846545d85b98e753fb95b1d0
                                    • Instruction ID: d0439a2481b54f19672a1d3b0a6ca147e069e3804ce18085cd9a45ca683e2770
                                    • Opcode Fuzzy Hash: f3933903bc7cc711361a48604753c41e02031946846545d85b98e753fb95b1d0
                                    • Instruction Fuzzy Hash: 7A110DB5C006488FCB20DF9AE448BDEFBF8EB48324F10842AE419A3300C378A544CFA5
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708530577.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_d8d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f2d7bda6a4875bd4186bdf3223f2dc0b4a42453f45c47d57b89ec3dc1f4bd97f
                                    • Instruction ID: fae1617523412cf2d7ae2ddedd2f63885e54a602dd985263e980f8afbc85364e
                                    • Opcode Fuzzy Hash: f2d7bda6a4875bd4186bdf3223f2dc0b4a42453f45c47d57b89ec3dc1f4bd97f
                                    • Instruction Fuzzy Hash: FA21F871504204DFDB05EF14D9C0F26BF66FB99318F2485AAD9090B2D6C33AD856D7B2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708530577.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_d8d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7280cc13d1319433126f642d42babf217be90593e0eb62b95d921823b6248ce1
                                    • Instruction ID: 31b7c9e25d181caf544cf261b1de1d1063d3a961a1131a3a5cab9a55c4094329
                                    • Opcode Fuzzy Hash: 7280cc13d1319433126f642d42babf217be90593e0eb62b95d921823b6248ce1
                                    • Instruction Fuzzy Hash: 1A21F1B1500204EFCB05EF58D9C0B26BF66FB98320F24C569E9490B2D6C33AE816D7B1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708561501.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_d9d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1c3367d61cec1e9ff09e5340b2b35d402b6fbcef5e025972d3668176a9382785
                                    • Instruction ID: 03857f1d12832101bc7ccd6238eaba725d2724d1db47e8c1da010429207648ee
                                    • Opcode Fuzzy Hash: 1c3367d61cec1e9ff09e5340b2b35d402b6fbcef5e025972d3668176a9382785
                                    • Instruction Fuzzy Hash: 50213871504204DFDF11DF14D9C0F2ABB66FB84318F24C56AD8490B256C33AE846CBB2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708561501.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_d9d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 554fa34984f8a88053efe31a675707191d165ffc1b5764ff7cd9a80f6a9f8058
                                    • Instruction ID: c5a5bc676c6e71f7f69b109ad6fee6f55eb511865250e32e2ce0277eb84745b6
                                    • Opcode Fuzzy Hash: 554fa34984f8a88053efe31a675707191d165ffc1b5764ff7cd9a80f6a9f8058
                                    • Instruction Fuzzy Hash: F221F271604204DFDF14DF24D984B26BF66FB88314F24C569E94E4B296C33AD807CA71
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708561501.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_d9d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3f1ee0a9d370421b070c1b6f89d5f183421cd741ff1512896ebcf27d65fe4843
                                    • Instruction ID: e2293cc2d553c0fe383d215f426593d0bf29b5fefd20816649e2912df951f812
                                    • Opcode Fuzzy Hash: 3f1ee0a9d370421b070c1b6f89d5f183421cd741ff1512896ebcf27d65fe4843
                                    • Instruction Fuzzy Hash: 2E215E755093808FDB16CF24D994715BF72EB46314F28C5EAD8498B6A7C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708530577.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_d8d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 4ff1b53bee707045cd16571a4bec2fedbb88431aaaca7aad29ad8ffa01b986f8
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 4C11D376504240DFCB16DF14D5C4B16BF72FB99314F28C6AAD9090B296C33AD85ACBA2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708530577.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_d8d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 5b9c652939d2e64f0f87aff658d711359613d2590c127e8595ec9f498fce7cee
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 2811E676504240DFCB06DF14D5C4B16BF72FB94324F28C5A9D9490B696C33AE85ACBA2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708561501.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_d9d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 58489c3f61924d27558184a5eb21aea17821769c0c96028cc0fb4c2ef8240ab9
                                    • Instruction ID: 68a166fdded524804424e184a187a090cd8977dafefff62e33bede94e81f3151
                                    • Opcode Fuzzy Hash: 58489c3f61924d27558184a5eb21aea17821769c0c96028cc0fb4c2ef8240ab9
                                    • Instruction Fuzzy Hash: 9011C476504280CFDB12CF14D5C4B19FF72FB85324F29C6AAD8494B656C33AD84ACBA2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708530577.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_d8d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fe009e701ac80bae3d025aeffda18658c0ca7e51844300919a18f709ecb7c63a
                                    • Instruction ID: a1de9e9b5eaafb3a63db9137d5ad90b94cfbb8459ba4a4d675b9735c1bb1344c
                                    • Opcode Fuzzy Hash: fe009e701ac80bae3d025aeffda18658c0ca7e51844300919a18f709ecb7c63a
                                    • Instruction Fuzzy Hash: CCF0F976600604AF9720DF0AD985C27FBAEEFC4770719C55AE84A4B652D671EC42CFB0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.2708530577.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_d8d000_Windows Update.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 190ae05e4a09fc692ee6386c5c85921266aff286fba44f2b3b847a4a13a9b7ec
                                    • Instruction ID: a05931167b9a6e8b1b9d638e4f61698b10657f651eee3939b16cfef0cc96fa95
                                    • Opcode Fuzzy Hash: 190ae05e4a09fc692ee6386c5c85921266aff286fba44f2b3b847a4a13a9b7ec
                                    • Instruction Fuzzy Hash: A8F03C75104684AFD3258F05C984C22BFBAEF857607198489E88A4B652C631FC42CB70

                                    Execution Graph

                                    Execution Coverage:15%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:78
                                    Total number of Limit Nodes:4
                                    execution_graph 12368 186ea00 12369 186ea48 WriteProcessMemory 12368->12369 12371 186ea9f 12369->12371 12372 186e940 12373 186e980 VirtualAllocEx 12372->12373 12375 186e9bd 12373->12375 12388 1868390 12390 1868391 12388->12390 12389 186839c 12390->12389 12393 186bb20 12390->12393 12391 18683ae 12395 186bb2c 12393->12395 12394 186bb1a 12394->12391 12395->12394 12400 186bbf4 12395->12400 12412 186bbf8 12395->12412 12424 186bf4e 12395->12424 12396 186bb5c 12396->12391 12403 186bbf8 12400->12403 12401 186bc68 12401->12396 12401->12401 12402 186bec3 12439 186a884 12402->12439 12403->12401 12403->12402 12406 186be4c 12403->12406 12431 186d241 12403->12431 12435 186d248 12403->12435 12405 186a884 CloseHandle 12405->12402 12406->12405 12406->12406 12407 186bf08 12407->12401 12443 186d528 12407->12443 12447 186d530 12407->12447 12415 186bbfd 12412->12415 12413 186bc68 12413->12396 12414 186bec3 12416 186a884 CloseHandle 12414->12416 12415->12413 12415->12414 12418 186be4c 12415->12418 12420 186d241 CheckRemoteDebuggerPresent 12415->12420 12421 186d248 CheckRemoteDebuggerPresent 12415->12421 12419 186bf08 12416->12419 12417 186a884 CloseHandle 12417->12414 12418->12417 12419->12413 12422 186d530 EnumWindows 12419->12422 12423 186d528 EnumWindows 12419->12423 12420->12418 12421->12418 12422->12413 12423->12413 12425 186becd 12424->12425 12426 186a884 CloseHandle 12425->12426 12428 186bf08 12426->12428 12427 186bf3d 12427->12396 12428->12427 12429 186d530 EnumWindows 12428->12429 12430 186d528 EnumWindows 12428->12430 12429->12427 12430->12427 12432 186d244 CheckRemoteDebuggerPresent 12431->12432 12434 186d2c5 12432->12434 12434->12406 12436 186d249 CheckRemoteDebuggerPresent 12435->12436 12438 186d2c5 12436->12438 12438->12406 12440 186d308 CloseHandle 12439->12440 12442 186d376 12440->12442 12442->12407 12444 186d52c EnumWindows 12443->12444 12446 186d5b7 12444->12446 12446->12401 12448 186d531 EnumWindows 12447->12448 12450 186d5b7 12448->12450 12450->12401 12451 1860850 12452 1860851 12451->12452 12455 1860860 12452->12455 12453 1860859 12457 1860870 12455->12457 12456 1860d58 VirtualProtect 12458 1860d92 12456->12458 12457->12456 12459 1860c8e 12457->12459 12458->12453 12459->12453 12460 186eaf0 12461 186eb3b ReadProcessMemory 12460->12461 12463 186eb7f 12461->12463 12376 186ec88 12377 186ed11 CreateProcessA 12376->12377 12379 186eed3 12377->12379 12380 1864ae8 12381 1864ae9 LdrInitializeThunk 12380->12381 12383 1864e87 12381->12383 12384 186e868 12385 186e8ad Wow64SetThreadContext 12384->12385 12387 186e8f5 12385->12387 12464 186e7b8 12465 186e7f8 ResumeThread 12464->12465 12467 186e829 12465->12467

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 1864ae8-1864eb7 LdrInitializeThunk 46 1864f13-1864f25 0->46 47 1864eb9-1864ebe 0->47 58 1864f37-1867788 call 1867ee7 * 2 46->58 48 1864ec2-1864ecd 47->48 50 1864f27-1864f2c 48->50 51 1864ecf-1864ed4 48->51 50->58 52 1864ed6-1864edf 51->52 53 1864eff-1864f06 51->53 52->50 54 1864ee1-1864efd 52->54 53->48 55 1864f08-1864f11 53->55 54->55 55->46 55->47 552 186778e-18677d5 58->552 553 1867ecf-1867ed4 58->553 559 18677db-1867958 552->559 556 1867edf-1867ee6 553->556 584 186795f-186796a 559->584 586 186796c-1867977 584->586 587 1867979-186797d 584->587 586->587 588 1867e75-1867e77 587->588 589 1867983-1867992 587->589 591 1867e93-1867e95 588->591 592 1867e79-1867e7d 588->592 597 1867994-18679a3 589->597 598 18679d8-1867b18 589->598 595 1867e97-1867ea9 591->595 596 1867eab-1867eaf 591->596 592->591 593 1867e7f-1867e91 592->593 599 1867ec3-1867ec7 593->599 595->599 596->599 600 1867eb1-1867ebc 596->600 607 1867bc7-1867bcb 597->607 608 18679a9-18679b8 597->608 598->588 678 1867b1e-1867bc2 598->678 599->559 602 1867ecd 599->602 600->599 602->556 610 1867c77-1867c7b 607->610 611 1867bd1-1867c72 607->611 616 1867c91-1867d5e 608->616 617 18679be-18679cd 608->617 610->588 612 1867c81-1867c8c 610->612 611->588 612->588 616->588 623 1867d63-1867d67 617->623 624 18679d3 617->624 625 1867e46-1867e6e 623->625 626 1867d6d-1867e44 623->626 624->588 625->588 626->588 678->588
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: ($($-$.$Coronovirus.Coronovirus$F$U
                                    • API String ID: 2994545307-4112397783
                                    • Opcode ID: 24f6683a2d1be13afe830d0ecc0a23fff04fdf27362fd8934b78384afd6ecc43
                                    • Instruction ID: 7c073fa4dd2e65862c8b09dd44b49b7ec11d892ce796279f04ce151cefdac09a
                                    • Opcode Fuzzy Hash: 24f6683a2d1be13afe830d0ecc0a23fff04fdf27362fd8934b78384afd6ecc43
                                    • Instruction Fuzzy Hash: B7533E74A412198FCB54DF69DD94B9EB7BABF88300F1085D8D80DAB369DA305E88CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 691 1864a57-1864a62 692 1864a64-1864a66 691->692 693 1864a69-1864a90 691->693 692->693 695 1864a92 693->695 696 1864b0e-1864e5e 693->696 697 1864a94 695->697 698 1864a99-186cafa 695->698 745 1864e68-1864e7d LdrInitializeThunk 696->745 697->698 703 186cb02-186cb2d 698->703 704 186cafc-186caff 698->704 708 186cb36-186cb53 703->708 709 186cb2f-186cb35 703->709 704->703 709->708 746 1864e87-1864eb7 745->746 750 1864f13-1864f25 746->750 751 1864eb9-1864ebe 746->751 762 1864f37-1864f3c 750->762 752 1864ec2-1864ecd 751->752 754 1864f27-1864f2c 752->754 755 1864ecf-1864ed4 752->755 754->762 756 1864ed6-1864edf 755->756 757 1864eff-1864f06 755->757 756->754 758 1864ee1-1864efd 756->758 757->752 759 1864f08-1864f11 757->759 758->759 759->750 759->751 764 1864f46-1864f6f 762->764 766 1864f79-1864fa5 call 1867ee7 764->766 767 1864fab-1864fb7 766->767 768 1864fc1-1864fcc call 1867ee7 767->768 769 1864fd2-1864fde 768->769 770 1864fe8-1864feb 769->770 771 1864ff3-1867788 770->771 1256 186778e-18677b8 771->1256 1257 1867ecf-1867ed4 771->1257 1262 18677c0-18677d5 1256->1262 1260 1867edf-1867ee6 1257->1260 1263 18677db-1867947 1262->1263 1286 1867951-1867958 1263->1286 1288 186795f-186796a 1286->1288 1290 186796c-1867977 1288->1290 1291 1867979-186797d 1288->1291 1290->1291 1292 1867e75-1867e77 1291->1292 1293 1867983-1867992 1291->1293 1295 1867e93-1867e95 1292->1295 1296 1867e79-1867e7d 1292->1296 1301 1867994-18679a3 1293->1301 1302 18679d8-1867b18 1293->1302 1299 1867e97-1867ea9 1295->1299 1300 1867eab-1867eaf 1295->1300 1296->1295 1297 1867e7f-1867e91 1296->1297 1303 1867ec3-1867ec7 1297->1303 1299->1303 1300->1303 1304 1867eb1-1867ebc 1300->1304 1311 1867bc7-1867bcb 1301->1311 1312 18679a9-18679b8 1301->1312 1302->1292 1382 1867b1e-1867bc2 1302->1382 1303->1263 1306 1867ecd 1303->1306 1304->1303 1306->1260 1314 1867c77-1867c7b 1311->1314 1315 1867bd1-1867c72 1311->1315 1320 1867c91-1867d5e 1312->1320 1321 18679be-18679cd 1312->1321 1314->1292 1316 1867c81-1867c8c 1314->1316 1315->1292 1316->1292 1320->1292 1327 1867d63-1867d67 1321->1327 1328 18679d3 1321->1328 1329 1867e46-1867e6e 1327->1329 1330 1867d6d-1867e44 1327->1330 1328->1292 1329->1292 1330->1292 1382->1292
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ($($-$.$Coronovirus.Coronovirus$F$U
                                    • API String ID: 0-4112397783
                                    • Opcode ID: 96c60c676bc995c38389ad70615192ea112e0da06e75c971bd811d3c260050d1
                                    • Instruction ID: de04b5f240962929b82011cf86a6fd315c91e6a6bc2f497d0914f55b5c02b215
                                    • Opcode Fuzzy Hash: 96c60c676bc995c38389ad70615192ea112e0da06e75c971bd811d3c260050d1
                                    • Instruction Fuzzy Hash: F2534F74A412198FCB54DF69DD94A9DB7BAFF88300F1085D8D80DAB369DA306E88CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1395 1864ad8-1864ae2 1396 1864ae4-1864ae6 1395->1396 1397 1864ae9-1864aec 1395->1397 1398 1864aed-1864e5e 1396->1398 1399 1864ae8 1396->1399 1397->1398 1438 1864e68-1864e7d LdrInitializeThunk 1398->1438 1399->1397 1439 1864e87-1864eb7 1438->1439 1443 1864f13-1864f25 1439->1443 1444 1864eb9-1864ebe 1439->1444 1455 1864f37-1864f3c 1443->1455 1445 1864ec2-1864ecd 1444->1445 1447 1864f27-1864f2c 1445->1447 1448 1864ecf-1864ed4 1445->1448 1447->1455 1449 1864ed6-1864edf 1448->1449 1450 1864eff-1864f06 1448->1450 1449->1447 1451 1864ee1-1864efd 1449->1451 1450->1445 1452 1864f08-1864f11 1450->1452 1451->1452 1452->1443 1452->1444 1457 1864f46-1864f6f 1455->1457 1459 1864f79-1864fa5 call 1867ee7 1457->1459 1460 1864fab-1864fb7 1459->1460 1461 1864fc1-1864fcc call 1867ee7 1460->1461 1462 1864fd2-1864fde 1461->1462 1463 1864fe8-1864feb 1462->1463 1464 1864ff3-1867788 1463->1464 1949 186778e-18677b8 1464->1949 1950 1867ecf-1867ed4 1464->1950 1955 18677c0-18677d5 1949->1955 1953 1867edf-1867ee6 1950->1953 1956 18677db-1867947 1955->1956 1979 1867951-1867958 1956->1979 1981 186795f-186796a 1979->1981 1983 186796c-1867977 1981->1983 1984 1867979-186797d 1981->1984 1983->1984 1985 1867e75-1867e77 1984->1985 1986 1867983-1867992 1984->1986 1988 1867e93-1867e95 1985->1988 1989 1867e79-1867e7d 1985->1989 1994 1867994-18679a3 1986->1994 1995 18679d8-1867b18 1986->1995 1992 1867e97-1867ea9 1988->1992 1993 1867eab-1867eaf 1988->1993 1989->1988 1990 1867e7f-1867e91 1989->1990 1996 1867ec3-1867ec7 1990->1996 1992->1996 1993->1996 1997 1867eb1-1867ebc 1993->1997 2004 1867bc7-1867bcb 1994->2004 2005 18679a9-18679b8 1994->2005 1995->1985 2075 1867b1e-1867bc2 1995->2075 1996->1956 1999 1867ecd 1996->1999 1997->1996 1999->1953 2007 1867c77-1867c7b 2004->2007 2008 1867bd1-1867c72 2004->2008 2013 1867c91-1867d5e 2005->2013 2014 18679be-18679cd 2005->2014 2007->1985 2009 1867c81-1867c8c 2007->2009 2008->1985 2009->1985 2013->1985 2020 1867d63-1867d67 2014->2020 2021 18679d3 2014->2021 2022 1867e46-1867e6e 2020->2022 2023 1867d6d-1867e44 2020->2023 2021->1985 2022->1985 2023->1985 2075->1985
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: ($($-$.$Coronovirus.Coronovirus$F$U
                                    • API String ID: 2994545307-4112397783
                                    • Opcode ID: 1599f733fb1667584f67bcfc005bac637c72f4d27b7a4fe763b9090ec2acd567
                                    • Instruction ID: 4092f935a65a164192f7d7dbc0fcc795290df414b8fb53bd39716bc0918082ad
                                    • Opcode Fuzzy Hash: 1599f733fb1667584f67bcfc005bac637c72f4d27b7a4fe763b9090ec2acd567
                                    • Instruction Fuzzy Hash: 0A433F74A412199FCB54DF69DD94B9DB7BABF88300F1085D8D80DAB369DA306E88CF44

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2088 1860860-186086e 2089 1860870 2088->2089 2090 1860871-18608a1 2088->2090 2089->2090 2094 18608a3-18608a7 2090->2094 2095 18608ba 2090->2095 2096 1860cf3-1860d0e 2094->2096 2097 18608ad-18608b8 2094->2097 2098 18608bc-1860907 2095->2098 2103 1860d10 2096->2103 2104 1860d11-1860d90 VirtualProtect 2096->2104 2097->2098 2101 18609b2-18609dd 2098->2101 2102 186090d-1860921 2098->2102 2122 18609e0-18609e8 2101->2122 2105 1860923-1860927 2102->2105 2106 186094e-1860950 2102->2106 2103->2104 2116 1860d92-1860d98 2104->2116 2117 1860d99-1860dba 2104->2117 2108 186092e 2105->2108 2109 1860929-186092c 2105->2109 2110 1860952-1860956 2106->2110 2111 18609a0-18609ac 2106->2111 2113 1860931-186093d 2108->2113 2109->2113 2114 186095d 2110->2114 2115 1860958-186095b 2110->2115 2111->2101 2111->2102 2119 1860943 2113->2119 2120 186093f-1860941 2113->2120 2121 1860960-1860978 2114->2121 2115->2121 2116->2117 2123 1860946-186094c 2119->2123 2120->2123 2121->2111 2125 186097a-186099e 2121->2125 2122->2096 2126 18609ee-18609fd 2122->2126 2123->2111 2125->2111 2125->2125 2126->2096 2127 1860a03-1860a3d 2126->2127 2127->2122 2128 1860a3f-1860a48 2127->2128 2128->2096 2129 1860a4e-1860a5d 2128->2129 2129->2096 2130 1860a63-1860a6f 2129->2130 2130->2096 2131 1860a75-1860a81 2130->2131 2131->2096 2132 1860a87-1860a94 2131->2132 2132->2096 2133 1860a9a-1860aa3 2132->2133 2133->2096 2134 1860aa9-1860ab5 2133->2134 2134->2096 2135 1860abb-1860ac4 2134->2135 2135->2096 2136 1860aca-1860ad6 2135->2136 2136->2096 2137 1860adc-1860ae5 2136->2137 2137->2096 2138 1860aeb-1860af8 2137->2138 2138->2096 2139 1860afe-1860b07 2138->2139 2139->2096 2140 1860b0d-1860b19 2139->2140 2140->2096 2141 1860b1f-1860b28 2140->2141 2141->2096 2142 1860b2e-1860b3a 2141->2142 2142->2096 2143 1860b40-1860b49 2142->2143 2143->2096 2144 1860b4f-1860b5c 2143->2144 2144->2096 2145 1860b62-1860b6b 2144->2145 2145->2096 2146 1860b71-1860b7d 2145->2146 2146->2096 2147 1860b83-1860b8c 2146->2147 2147->2096 2148 1860b92-1860b9e 2147->2148 2148->2096 2149 1860ba4-1860bad 2148->2149 2149->2096 2150 1860bb3-1860bc0 2149->2150 2150->2096 2151 1860bc6-1860bcf 2150->2151 2151->2096 2152 1860bd5-1860be1 2151->2152 2152->2096 2153 1860be7-1860bf0 2152->2153 2153->2096 2154 1860bf6-1860c02 2153->2154 2154->2096 2155 1860c08-1860c11 2154->2155 2155->2096 2156 1860c17-1860c24 2155->2156 2156->2096 2157 1860c2a-1860c33 2156->2157 2157->2096 2158 1860c39-1860c45 2157->2158 2158->2096 2159 1860c4b-1860c54 2158->2159 2159->2096 2160 1860c5a-1860c63 2159->2160 2160->2096 2161 1860c69-1860c83 call 1860464 2160->2161 2163 1860c88-1860c8c 2161->2163 2164 1860c96-1860c9e 2163->2164 2165 1860c8e-1860c95 2163->2165 2166 1860ca0 2164->2166 2167 1860ceb-1860cf2 2164->2167 2168 1860ca3-1860cad 2166->2168 2168->2096 2169 1860caf-1860cc8 2168->2169 2169->2096 2170 1860cca-1860cde 2169->2170 2170->2096 2171 1860ce0-1860ce9 2170->2171 2171->2167 2171->2168
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @
                                    • API String ID: 0-2766056989
                                    • Opcode ID: 32d307f27a19854a7cba3d1459ce53b7175713840d616e24624cc445fd2000a6
                                    • Instruction ID: 897b2b771c092959aed6c1853e91f41973945fee1f2e462e449b0dae458e57b5
                                    • Opcode Fuzzy Hash: 32d307f27a19854a7cba3d1459ce53b7175713840d616e24624cc445fd2000a6
                                    • Instruction Fuzzy Hash: 7602F671E002099FDB54CF98C590AADBBB6FF49310F64855AE815EB309D334EE81CB96

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2304 186ec7d-186ed1d 2307 186ed56-186ed76 2304->2307 2308 186ed1f-186ed29 2304->2308 2315 186edaf-186edde 2307->2315 2316 186ed78-186ed82 2307->2316 2308->2307 2309 186ed2b-186ed2d 2308->2309 2310 186ed50-186ed53 2309->2310 2311 186ed2f-186ed39 2309->2311 2310->2307 2313 186ed3d-186ed4c 2311->2313 2314 186ed3b 2311->2314 2313->2313 2317 186ed4e 2313->2317 2314->2313 2322 186ee17-186eed1 CreateProcessA 2315->2322 2323 186ede0-186edea 2315->2323 2316->2315 2318 186ed84-186ed86 2316->2318 2317->2310 2320 186ed88-186ed92 2318->2320 2321 186eda9-186edac 2318->2321 2324 186ed96-186eda5 2320->2324 2325 186ed94 2320->2325 2321->2315 2336 186eed3-186eed9 2322->2336 2337 186eeda-186ef60 2322->2337 2323->2322 2327 186edec-186edee 2323->2327 2324->2324 2326 186eda7 2324->2326 2325->2324 2326->2321 2328 186edf0-186edfa 2327->2328 2329 186ee11-186ee14 2327->2329 2331 186edfe-186ee0d 2328->2331 2332 186edfc 2328->2332 2329->2322 2331->2331 2334 186ee0f 2331->2334 2332->2331 2334->2329 2336->2337 2347 186ef62-186ef66 2337->2347 2348 186ef70-186ef74 2337->2348 2347->2348 2349 186ef68-186ef6b call 18680a8 2347->2349 2350 186ef76-186ef7a 2348->2350 2351 186ef84-186ef88 2348->2351 2349->2348 2350->2351 2353 186ef7c-186ef7f call 18680a8 2350->2353 2354 186ef8a-186ef8e 2351->2354 2355 186ef98-186ef9c 2351->2355 2353->2351 2354->2355 2359 186ef90-186ef93 call 18680a8 2354->2359 2356 186efae-186efb5 2355->2356 2357 186ef9e-186efa4 2355->2357 2361 186efb7-186efc6 2356->2361 2362 186efcc 2356->2362 2357->2356 2359->2355 2361->2362 2364 186efcd 2362->2364 2364->2364
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0186EEBE
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: df9dfb931557f786ad48b4184c8f932f54c0b705c864338bb9d657864c8bb08c
                                    • Instruction ID: acf1053e21318e84faeb9b155c296ad796addf6b28343912b96b7cc1df000edd
                                    • Opcode Fuzzy Hash: df9dfb931557f786ad48b4184c8f932f54c0b705c864338bb9d657864c8bb08c
                                    • Instruction Fuzzy Hash: C5A15B75D002198FEB21CF6CC840BEDBBB6BF58310F1485A9D818E7290DB749A85CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2365 186ec88-186ed1d 2367 186ed56-186ed76 2365->2367 2368 186ed1f-186ed29 2365->2368 2375 186edaf-186edde 2367->2375 2376 186ed78-186ed82 2367->2376 2368->2367 2369 186ed2b-186ed2d 2368->2369 2370 186ed50-186ed53 2369->2370 2371 186ed2f-186ed39 2369->2371 2370->2367 2373 186ed3d-186ed4c 2371->2373 2374 186ed3b 2371->2374 2373->2373 2377 186ed4e 2373->2377 2374->2373 2382 186ee17-186eed1 CreateProcessA 2375->2382 2383 186ede0-186edea 2375->2383 2376->2375 2378 186ed84-186ed86 2376->2378 2377->2370 2380 186ed88-186ed92 2378->2380 2381 186eda9-186edac 2378->2381 2384 186ed96-186eda5 2380->2384 2385 186ed94 2380->2385 2381->2375 2396 186eed3-186eed9 2382->2396 2397 186eeda-186ef60 2382->2397 2383->2382 2387 186edec-186edee 2383->2387 2384->2384 2386 186eda7 2384->2386 2385->2384 2386->2381 2388 186edf0-186edfa 2387->2388 2389 186ee11-186ee14 2387->2389 2391 186edfe-186ee0d 2388->2391 2392 186edfc 2388->2392 2389->2382 2391->2391 2394 186ee0f 2391->2394 2392->2391 2394->2389 2396->2397 2407 186ef62-186ef66 2397->2407 2408 186ef70-186ef74 2397->2408 2407->2408 2409 186ef68-186ef6b call 18680a8 2407->2409 2410 186ef76-186ef7a 2408->2410 2411 186ef84-186ef88 2408->2411 2409->2408 2410->2411 2413 186ef7c-186ef7f call 18680a8 2410->2413 2414 186ef8a-186ef8e 2411->2414 2415 186ef98-186ef9c 2411->2415 2413->2411 2414->2415 2419 186ef90-186ef93 call 18680a8 2414->2419 2416 186efae-186efb5 2415->2416 2417 186ef9e-186efa4 2415->2417 2421 186efb7-186efc6 2416->2421 2422 186efcc 2416->2422 2417->2416 2419->2415 2421->2422 2424 186efcd 2422->2424 2424->2424
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0186EEBE
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 2989d11859c473bbfbbc37bdec188e06978b3977a30ed7e0ea2a6a67c834b75e
                                    • Instruction ID: dd209c071767619378d32e2be945efde286e1fa58e220fcc698423215d081772
                                    • Opcode Fuzzy Hash: 2989d11859c473bbfbbc37bdec188e06978b3977a30ed7e0ea2a6a67c834b75e
                                    • Instruction Fuzzy Hash: 08914B75D006198FEB25CF6CC840BEEBBB6BF58310F1485A9D818E7290DB749A85CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2425 186e9f8-186ea4e 2428 186ea50-186ea5c 2425->2428 2429 186ea5e-186ea9d WriteProcessMemory 2425->2429 2428->2429 2431 186eaa6-186ead6 2429->2431 2432 186ea9f-186eaa5 2429->2432 2432->2431
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0186EA90
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 46b8f97bc8d1f78fbe2a96ef763890f0c629f559b59405f3f98966023a91e7e1
                                    • Instruction ID: 51f2cce321906a1824b005437f35c42720de396adfef123bdc8191b72d47a19a
                                    • Opcode Fuzzy Hash: 46b8f97bc8d1f78fbe2a96ef763890f0c629f559b59405f3f98966023a91e7e1
                                    • Instruction Fuzzy Hash: A62125B59003599FDB10DFAEC885BEEBBF5FF48310F10842AE919A7240D7789944CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2436 186ea00-186ea4e 2438 186ea50-186ea5c 2436->2438 2439 186ea5e-186ea9d WriteProcessMemory 2436->2439 2438->2439 2441 186eaa6-186ead6 2439->2441 2442 186ea9f-186eaa5 2439->2442 2442->2441
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0186EA90
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: ed5c517b21e1911625d7ce302499e098f7cf81a4f5aca4cfef7476082260ecf3
                                    • Instruction ID: 1d3704c8e8be615517748b097f631362e76e338841461d8745a851f69336e209
                                    • Opcode Fuzzy Hash: ed5c517b21e1911625d7ce302499e098f7cf81a4f5aca4cfef7476082260ecf3
                                    • Instruction Fuzzy Hash: FF2105B59003499FDB10DFAAC885BEEBBF5FF48310F10842AE919A7250D7789944CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2446 186e860-186e8b3 2449 186e8b5-186e8c1 2446->2449 2450 186e8c3-186e8c6 2446->2450 2449->2450 2451 186e8cd-186e8f3 Wow64SetThreadContext 2450->2451 2452 186e8f5-186e8fb 2451->2452 2453 186e8fc-186e92c 2451->2453 2452->2453
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0186E8E6
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 2c31fb62528a21c2cf0185d26cd4ea119cae10e106782422409336403adfa79f
                                    • Instruction ID: bf2f7b8d3b9410f99d1de0c5948e240de27e6b2fbbf23ac79efb4e74024072e2
                                    • Opcode Fuzzy Hash: 2c31fb62528a21c2cf0185d26cd4ea119cae10e106782422409336403adfa79f
                                    • Instruction Fuzzy Hash: 62213771D002098FDB10DFAAC885BEEBBF4EF48320F14842AD519A7241CB789A45CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2457 186eaea-186eb7d ReadProcessMemory 2461 186eb86-186ebb6 2457->2461 2462 186eb7f-186eb85 2457->2462 2462->2461
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0186EB70
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: e74d573380005c6f4589cf5218f7e272838574c1fe9dc0f33ed398305ff79868
                                    • Instruction ID: b5a140367007b5f82e5e589967f74d2fd90e3156acb3323852e6bc8690fbd345
                                    • Opcode Fuzzy Hash: e74d573380005c6f4589cf5218f7e272838574c1fe9dc0f33ed398305ff79868
                                    • Instruction Fuzzy Hash: 562139B1C007599FDB10DFAAC881AEEFBF5FF48320F50842AE519A7250C7389544CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2466 186e868-186e8b3 2468 186e8b5-186e8c1 2466->2468 2469 186e8c3-186e8f3 Wow64SetThreadContext 2466->2469 2468->2469 2471 186e8f5-186e8fb 2469->2471 2472 186e8fc-186e92c 2469->2472 2471->2472
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0186E8E6
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: dc078addcdbac844ee623ab112063c2f49f29cbda04f644ca047ac7515f04bd5
                                    • Instruction ID: 0f7a2e6e4c0f2622bc96d3d8c6fb6af6e27a9ee821f4102fab2d9be504ecc92c
                                    • Opcode Fuzzy Hash: dc078addcdbac844ee623ab112063c2f49f29cbda04f644ca047ac7515f04bd5
                                    • Instruction Fuzzy Hash: CA211875D003098FDB10DFAAC485BAEBBF4EF48310F14842AD519A7241CB789A44CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2476 186eaf0-186eb7d ReadProcessMemory 2479 186eb86-186ebb6 2476->2479 2480 186eb7f-186eb85 2476->2480 2480->2479
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0186EB70
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 9a1225642b24c2b4748488965af27ed5ec18a7ba48b100d0406aa5cb05532209
                                    • Instruction ID: 8cb24b799ec1dfe73441be47eb94cf995400ba9e1a4c93b6354712376210d424
                                    • Opcode Fuzzy Hash: 9a1225642b24c2b4748488965af27ed5ec18a7ba48b100d0406aa5cb05532209
                                    • Instruction Fuzzy Hash: 132109B1C003499FDB10DFAAC885AEEFBF5FF48310F50842AE519A7250C7789544CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2484 186d528-186d52a 2485 186d531-186d577 2484->2485 2486 186d52c-186d52d 2484->2486 2488 186d583-186d5b5 EnumWindows 2485->2488 2489 186d579-186d581 2485->2489 2486->2485 2492 186d5b7-186d5bd 2488->2492 2493 186d5be-186d5eb 2488->2493 2489->2488 2492->2493
                                    APIs
                                    • EnumWindows.USER32(00000000,?), ref: 0186D5A8
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: EnumWindows
                                    • String ID:
                                    • API String ID: 1129996299-0
                                    • Opcode ID: aa93c448321a92069e22f09effa5cc11f88655744745e06a2ecf37b08f3696db
                                    • Instruction ID: db4cb1a8d418f0a444bc45939d00a41ccc4111770844b1eb9536eb0455508463
                                    • Opcode Fuzzy Hash: aa93c448321a92069e22f09effa5cc11f88655744745e06a2ecf37b08f3696db
                                    • Instruction Fuzzy Hash: 2E2149B1D002098FDB10DFAAC944BEFBBF9AF88314F14842AD555A7250CB799A45CFA0
                                    APIs
                                    • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0186D2B6
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: 0c5aade7ce3ed295a848fb9219a813581ed12011fc9ff9e14f7bb56ea030673b
                                    • Instruction ID: 2b26967ed2378516afd997da02bdcc827d98a3c7a4be7e5793d2d5aa6ac5afe6
                                    • Opcode Fuzzy Hash: 0c5aade7ce3ed295a848fb9219a813581ed12011fc9ff9e14f7bb56ea030673b
                                    • Instruction Fuzzy Hash: 44110BB1D006498EDB10DFAAC4446AEFBF9FF48320F508519D559A7250CB78A544CFA5
                                    APIs
                                    • EnumWindows.USER32(00000000,?), ref: 0186D5A8
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: EnumWindows
                                    • String ID:
                                    • API String ID: 1129996299-0
                                    • Opcode ID: 6072a32b0b41e6632ff1a13710cc87c9af080312b196794826bd33636e5cf8a5
                                    • Instruction ID: 3da1e07bd7bfc46819b23dc24dbe294e5e1c193502d7c05b8ea84b5cc5beae20
                                    • Opcode Fuzzy Hash: 6072a32b0b41e6632ff1a13710cc87c9af080312b196794826bd33636e5cf8a5
                                    • Instruction Fuzzy Hash: 9F211571D002098BDB14DFAAC945BAEBBF5AF88310F14842AD455A7250CB79AA44CFA1
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0186E9AE
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 83e28b42cfae9efa264e4362fe5abefb08ddfb7bf172774b3b12ae81b728546b
                                    • Instruction ID: eaf7c0d1a4b55c072003eb8a841c43d35c2b5dfb189a5818a0697c79f245d097
                                    • Opcode Fuzzy Hash: 83e28b42cfae9efa264e4362fe5abefb08ddfb7bf172774b3b12ae81b728546b
                                    • Instruction Fuzzy Hash: EE1167719002499FDB10DFAAC845BEFBFF5EF48320F108419E519A7250CB79A540CFA0
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01860D83
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: a68fb23e935f1785df37d7f89eca534288e285cf7cf3748df39137dc7369dc12
                                    • Instruction ID: 781f17a89b557e3d9b538d81c073eae0ef8ec029e09702065004af3abe41ce4f
                                    • Opcode Fuzzy Hash: a68fb23e935f1785df37d7f89eca534288e285cf7cf3748df39137dc7369dc12
                                    • Instruction Fuzzy Hash: EA21F9B59006499FDB10DF9AC444BDEFBF8FF48310F108429E958A7250D778A644CFA5
                                    APIs
                                    • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0186D2B6
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: 70764152d91ff27ca12ea47b14a000b5b6802d194d7cde168b98101d4bbace56
                                    • Instruction ID: 89f7cbe2a7797e64e934b832c5ce70a0f0b955d70699b3f7f64ff89b69535ec0
                                    • Opcode Fuzzy Hash: 70764152d91ff27ca12ea47b14a000b5b6802d194d7cde168b98101d4bbace56
                                    • Instruction Fuzzy Hash: FC11F9B1D006498FDB10DFAAC444AAFFBF9FF48324F50842AD559A7250CB78A944CFA1
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0186E9AE
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 90daa59c3b30182b4430a286cb554086f44a15becc01420e3c6a67e5616c5b71
                                    • Instruction ID: 18707d05487f6f7a363c24b0c5d8d0a129b26f9a6079c4086bf5e12c0e221cf6
                                    • Opcode Fuzzy Hash: 90daa59c3b30182b4430a286cb554086f44a15becc01420e3c6a67e5616c5b71
                                    • Instruction Fuzzy Hash: 5F1137759002499FDB10DFAAC844BEFBFF5EF48320F108419E519A7250CB79A544CFA1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 0d6523cd8cbee98ec3145f6d848af55202e948cd8b7d0b06f9b297cce14e5c7c
                                    • Instruction ID: c2f8eabd5ebb759778e78a476e4780ee7fc0ab8d90b4e3ddbe43293548749d5a
                                    • Opcode Fuzzy Hash: 0d6523cd8cbee98ec3145f6d848af55202e948cd8b7d0b06f9b297cce14e5c7c
                                    • Instruction Fuzzy Hash: 07112BB1D006498FDB14DFAAC8457EEFBF5EF48320F148429D519A7240CB79A944CB94
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 79cccb56d6451c197785304e4ffd17688792660cbb5216d3f4cd90cb9652afcb
                                    • Instruction ID: 25e4ce37bab7558327bf6e70b3154e9b8af8ce83d7704a25d57fa755cc9325da
                                    • Opcode Fuzzy Hash: 79cccb56d6451c197785304e4ffd17688792660cbb5216d3f4cd90cb9652afcb
                                    • Instruction Fuzzy Hash: 2C113AB1D002498FDB14DFAAC4457EFFBF9EF88320F148419D519A7240CB79A544CBA4
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0186D367
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 4232a566a395699ad06f93641f32f88a4880ab3c47b0e894cf25216680264f0b
                                    • Instruction ID: 2a6c8aa16a6a278dc57f5c6e01576b7d4c3b89f901e13ee548cd4b0dd682f786
                                    • Opcode Fuzzy Hash: 4232a566a395699ad06f93641f32f88a4880ab3c47b0e894cf25216680264f0b
                                    • Instruction Fuzzy Hash: CE1133B1900248CFCB10DF99E544BEEBBF8FB48320F20841AD558A7250D378A944CFA1
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0186D367
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3340501641.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1860000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 5eed5c8b0b68df6027d949f22573c137c79ea5ab4378786c8a3717b29fa03d0c
                                    • Instruction ID: c45739a9304c1a2c57a6cf152b1df1f7f20f9e040bb9d543eee469a6e6347c91
                                    • Opcode Fuzzy Hash: 5eed5c8b0b68df6027d949f22573c137c79ea5ab4378786c8a3717b29fa03d0c
                                    • Instruction Fuzzy Hash: 191103B1900649CFCB10DF9AD544B9EFBF8EB48324F20845AE558A7240D778A944CFA5
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3339671123.00000000017AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017AD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_17ad000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4ac0a5e2a61299bb6230013e180facd886886f09214b02ede7e941639e5fd209
                                    • Instruction ID: 7e0efd95efc7bd49c017fcc65946fc6b38ef4e18ad95ba0d6c5a415da4125977
                                    • Opcode Fuzzy Hash: 4ac0a5e2a61299bb6230013e180facd886886f09214b02ede7e941639e5fd209
                                    • Instruction Fuzzy Hash: A1212FB06842009FCB25DF68C584B27FBA5FBC4314F60C6ADE8494B652C33AD807C662
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3339671123.00000000017AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017AD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_17ad000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 93d49e4a1442b6ae817b54e6d01109cf66e3cf9bb30be93c629efda23a912acd
                                    • Instruction ID: 9428abd89dd88bd794e4dfe0fb4b7dbdf20a981a3e1132dd35969c297f7f3bef
                                    • Opcode Fuzzy Hash: 93d49e4a1442b6ae817b54e6d01109cf66e3cf9bb30be93c629efda23a912acd
                                    • Instruction Fuzzy Hash: F3119D75544284CFDB26DF14D588B16FFA1FB84214F24C6A9D8494BA52C33AD84ACB52
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3365600031.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5760000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 18e8311e824d04aeacca5d1e3b9f22c9511ea7c7ce4131e74fb51722760b825a
                                    • Instruction ID: d96d0aba331e699d518e09f1313dca43f5e4bc6ddb6d958363efc051266c5b5e
                                    • Opcode Fuzzy Hash: 18e8311e824d04aeacca5d1e3b9f22c9511ea7c7ce4131e74fb51722760b825a
                                    • Instruction Fuzzy Hash: BAF030749093C49FC352DFB4C8589597FF0AF07201F1A81EBD884CB2A3D6308A44EB52
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3365600031.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5760000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: deb7ff87779e751235f07266728290bd1f8be8f86c89bcbc61ab9da02cf2629a
                                    • Instruction ID: f41854aaab4ce3009439454272cca90b7b12493434dd98e8bada51b50b373a8f
                                    • Opcode Fuzzy Hash: deb7ff87779e751235f07266728290bd1f8be8f86c89bcbc61ab9da02cf2629a
                                    • Instruction Fuzzy Hash: C2E0ED7040F388AFD3138B7889185657F38DB13255B1941EFD8859A5A3CA360E54EBA2
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3365600031.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5760000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 44c91c8576e4cfe6e8b73892a4cd4b77ff18ac5c3e3ced859e96d8f0d23eaf19
                                    • Instruction ID: c26fe5ccfb043d4d0f40c60a94609cd2af8d8fad8d820c492eaf99226a39c201
                                    • Opcode Fuzzy Hash: 44c91c8576e4cfe6e8b73892a4cd4b77ff18ac5c3e3ced859e96d8f0d23eaf19
                                    • Instruction Fuzzy Hash: 56E0B674911208DFC750DFA8D589A9CBFF4AB08201F6040E9E90597361EA319E50EB81
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.3365600031.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5760000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8cabda00d009bb61f79a017ec374db2356c7ff7bc46add1fb19b00a2e5f544b8
                                    • Instruction ID: 2cebb764260b04865de4ce3d81bf39b38d03138c121f4ccc0afe560b7320d70c
                                    • Opcode Fuzzy Hash: 8cabda00d009bb61f79a017ec374db2356c7ff7bc46add1fb19b00a2e5f544b8
                                    • Instruction Fuzzy Hash: 29D0A970402208DFC314DBA88104699772CEB01211F2000AC980422280CE328A40E681

                                    Execution Graph

                                    Execution Coverage:8.8%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:70
                                    Total number of Limit Nodes:7
                                    execution_graph 15003 17b7768 15004 17b76eb 15003->15004 15005 17b76f3 DuplicateHandle 15004->15005 15007 17b7773 15004->15007 15006 17b773e 15005->15006 15008 17b6ca0 15012 17b6cd0 15008->15012 15017 17b6d97 15008->15017 15009 17b6cb0 15013 17b6d0a 15012->15013 15014 17b6e01 15013->15014 15022 17b6f33 15013->15022 15027 17b6f40 15013->15027 15014->15009 15018 17b6d9c 15017->15018 15019 17b6e01 15018->15019 15020 17b6f33 2 API calls 15018->15020 15021 17b6f40 2 API calls 15018->15021 15019->15009 15020->15019 15021->15019 15024 17b6f3a 15022->15024 15025 17b6fa0 15022->15025 15023 17b6f87 15023->15014 15024->15023 15031 17b6a70 15024->15031 15025->15014 15028 17b6f4d 15027->15028 15029 17b6f87 15028->15029 15030 17b6a70 2 API calls 15028->15030 15029->15014 15030->15029 15032 17b6a75 15031->15032 15034 17b7ca0 15032->15034 15035 17b7124 15032->15035 15034->15034 15036 17b712f 15035->15036 15040 17bd028 15036->15040 15049 17bd040 15036->15049 15037 17b7d49 15037->15034 15042 17bd071 15040->15042 15044 17bd172 15040->15044 15041 17bd07d 15041->15037 15042->15041 15058 17bd3a8 15042->15058 15061 17bd398 15042->15061 15043 17bd0be 15065 17be6c8 15043->15065 15070 17be6c3 15043->15070 15044->15037 15051 17bd172 15049->15051 15052 17bd071 15049->15052 15050 17bd07d 15050->15037 15051->15037 15052->15050 15056 17bd3a8 GetModuleHandleW 15052->15056 15057 17bd398 GetModuleHandleW 15052->15057 15053 17bd0be 15054 17be6c8 CreateWindowExW 15053->15054 15055 17be6c3 CreateWindowExW 15053->15055 15054->15051 15055->15051 15056->15053 15057->15053 15075 17bd3e8 15058->15075 15059 17bd3b2 15059->15043 15062 17bd3a8 15061->15062 15063 17bd3ad 15061->15063 15064 17bd3e8 GetModuleHandleW 15062->15064 15063->15043 15064->15063 15066 17be6f3 15065->15066 15067 17be7a2 15066->15067 15080 17bf59b 15066->15080 15084 17bf5a0 15066->15084 15071 17be6c8 15070->15071 15072 17be7a2 15071->15072 15073 17bf59b CreateWindowExW 15071->15073 15074 17bf5a0 CreateWindowExW 15071->15074 15073->15072 15074->15072 15076 17bd42c 15075->15076 15077 17bd409 15075->15077 15076->15059 15077->15076 15078 17bd630 GetModuleHandleW 15077->15078 15079 17bd65d 15078->15079 15079->15059 15081 17bf5a0 15080->15081 15087 17bc45c 15081->15087 15085 17bc45c CreateWindowExW 15084->15085 15086 17bf5d5 15085->15086 15086->15067 15088 17bf9f0 CreateWindowExW 15087->15088 15090 17bfb14 15088->15090

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 578 17bd3e8-17bd407 579 17bd409-17bd416 call 17bc294 578->579 580 17bd433-17bd437 578->580 585 17bd418 579->585 586 17bd42c 579->586 582 17bd44b-17bd48c 580->582 583 17bd439-17bd443 580->583 589 17bd499-17bd4a7 582->589 590 17bd48e-17bd496 582->590 583->582 633 17bd41e call 17bd689 585->633 634 17bd41e call 17bd690 585->634 586->580 591 17bd4cb-17bd4cd 589->591 592 17bd4a9-17bd4ae 589->592 590->589 597 17bd4d0-17bd4d7 591->597 594 17bd4b9 592->594 595 17bd4b0-17bd4b7 call 17bc2a0 592->595 593 17bd424-17bd426 593->586 596 17bd568-17bd628 593->596 599 17bd4bb-17bd4c9 594->599 595->599 628 17bd62a-17bd62d 596->628 629 17bd630-17bd65b GetModuleHandleW 596->629 600 17bd4d9-17bd4e1 597->600 601 17bd4e4-17bd4eb 597->601 599->597 600->601 603 17bd4f8-17bd501 call 17bc2b0 601->603 604 17bd4ed-17bd4f5 601->604 609 17bd50e-17bd513 603->609 610 17bd503-17bd50b 603->610 604->603 611 17bd531-17bd53e 609->611 612 17bd515-17bd51c 609->612 610->609 619 17bd561-17bd567 611->619 620 17bd540-17bd55e 611->620 612->611 614 17bd51e-17bd52e call 17bc068 call 17bc2c0 612->614 614->611 620->619 628->629 630 17bd65d-17bd663 629->630 631 17bd664-17bd678 629->631 630->631 633->593 634->593
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 017BD64E
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2859920378.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_17b0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 069027ee88ba8bfdb8e8967ad4bd502be08afcc486ecf352ef741d925d686cdd
                                    • Instruction ID: 9c88e8ebd6baf5d54a13931829abd0b27b133ed58cd24abd503c86ca8a989333
                                    • Opcode Fuzzy Hash: 069027ee88ba8bfdb8e8967ad4bd502be08afcc486ecf352ef741d925d686cdd
                                    • Instruction Fuzzy Hash: 7D816970A00B058FD725DF69D49479ABBF5FF88308F108A2ED44AD7A50DB79E849CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 635 17bc45c-17bfa56 637 17bfa58-17bfa5e 635->637 638 17bfa61-17bfa68 635->638 637->638 639 17bfa6a-17bfa70 638->639 640 17bfa73-17bfb12 CreateWindowExW 638->640 639->640 642 17bfb1b-17bfb53 640->642 643 17bfb14-17bfb1a 640->643 647 17bfb60 642->647 648 17bfb55-17bfb58 642->648 643->642 648->647
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 017BFB02
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2859920378.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_17b0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 0814bf4ecca7bfce03fc1abfe961a022c0d4704be0ef1358ebe115fabe5a7ecc
                                    • Instruction ID: 31c9f96b6bc0343a8d802752d58c888ca4ef4a56a3499443fad7991e0f9223ad
                                    • Opcode Fuzzy Hash: 0814bf4ecca7bfce03fc1abfe961a022c0d4704be0ef1358ebe115fabe5a7ecc
                                    • Instruction Fuzzy Hash: 6251C0B1D003099FDB14DFAAC994ADEFFB5BF48710F24812AE819AB210D7749945CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 649 17b7768-17b7769 650 17b76eb-17b76f0 649->650 651 17b776b-17b7771 649->651 652 17b76f3-17b773c DuplicateHandle 650->652 651->652 653 17b7773-17b7896 651->653 654 17b773e-17b7744 652->654 655 17b7745-17b7762 652->655 654->655
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017B772F
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2859920378.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_17b0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 701c0313d352de115fe724a23fceb3987ec611cbd98161f95df26b65524ecfaa
                                    • Instruction ID: 605f0642ba4895851b7ba57f8e17083490e3a8b75ae5b9465cee5a9e1ef7f441
                                    • Opcode Fuzzy Hash: 701c0313d352de115fe724a23fceb3987ec611cbd98161f95df26b65524ecfaa
                                    • Instruction Fuzzy Hash: 7F4119B4A102089FE704DF65E586BAA7FB6FB98311F208169FA0597380CB785C55DF22

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 671 17b76a0-17b76f0 673 17b76f3-17b773c DuplicateHandle 671->673 674 17b773e-17b7744 673->674 675 17b7745-17b7762 673->675 674->675
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017B772F
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2859920378.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_17b0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: b103a12f913b9628c199b0b28342c89d64b64f436dc17fd97894f0e5b4846ed2
                                    • Instruction ID: 865fb03a39fb52af88fbe9b50cc53274b905fe979b05684062a9c670a2aaeb4d
                                    • Opcode Fuzzy Hash: b103a12f913b9628c199b0b28342c89d64b64f436dc17fd97894f0e5b4846ed2
                                    • Instruction Fuzzy Hash: 8E21E3B5900248AFDB10CFAAD985ADEBFF5EB48310F14801AE918A3350D378A945CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 678 17b76a8-17b76f0 680 17b76f3-17b773c DuplicateHandle 678->680 681 17b773e-17b7744 680->681 682 17b7745-17b7762 680->682 681->682
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017B772F
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2859920378.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_17b0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 1c0a0d86e50a0d001f8a106bac4400bd0f9d74bceba7a2e2df4c470a873de7d6
                                    • Instruction ID: 92e700649c68eb21befd5bb3450345e4383cec58ef7ab3485ff496b6df6a6a67
                                    • Opcode Fuzzy Hash: 1c0a0d86e50a0d001f8a106bac4400bd0f9d74bceba7a2e2df4c470a873de7d6
                                    • Instruction Fuzzy Hash: 5821D3B59002489FDB10CFAAD984ADEFFF9FB48310F14841AE918A3350D378A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 685 17bd5e8-17bd628 686 17bd62a-17bd62d 685->686 687 17bd630-17bd65b GetModuleHandleW 685->687 686->687 688 17bd65d-17bd663 687->688 689 17bd664-17bd678 687->689 688->689
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 017BD64E
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2859920378.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_17b0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: cd00a27098aa78f146aba3658e42c4a225fd8b85a8561c868b5647b437166088
                                    • Instruction ID: 9281493d1001b089fe8e519007964e429d501e4fea094dfa22f00e8b229211ba
                                    • Opcode Fuzzy Hash: cd00a27098aa78f146aba3658e42c4a225fd8b85a8561c868b5647b437166088
                                    • Instruction Fuzzy Hash: 8511DFB6C003498FDB20DF9AD444BDEFBF5AB88328F14842AD529A7210C379A545CFA5
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2771610541.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_155d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1a626a293317e5240e41fd531cdd734ebf99df7526a32cf778bda23ce2cb2284
                                    • Instruction ID: ced09656124a71573971f759629d66cd3a95f1ded2cb0e0b3dd13aba0613cdf2
                                    • Opcode Fuzzy Hash: 1a626a293317e5240e41fd531cdd734ebf99df7526a32cf778bda23ce2cb2284
                                    • Instruction Fuzzy Hash: 96210672500204DFDB45DF98D9D0B1ABFB5FB88318F20856ADD090F256C33AD456CAA2
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2771610541.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_155d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c2cb9530c37cc66cc34df1b6a842140f35128d8d8d147717485c0494b8eb1177
                                    • Instruction ID: 399196325cb8277ad4941787f38186d72b7fe8b511866ad664812400af42866e
                                    • Opcode Fuzzy Hash: c2cb9530c37cc66cc34df1b6a842140f35128d8d8d147717485c0494b8eb1177
                                    • Instruction Fuzzy Hash: AA21F172500204DFDB45DF98D9D0B6ABFB5FB98320F20C56AED090F256C37AE456C6A2
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2787164736.000000000156D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0156D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_156d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b2eff684d7048a5447678e789f83189bb0e916ca7b0b4c87557ebb2b617af990
                                    • Instruction ID: 0f73df53db8fc6ab560c7c470f086e73c08e1a46fe10c16f3776500146425dae
                                    • Opcode Fuzzy Hash: b2eff684d7048a5447678e789f83189bb0e916ca7b0b4c87557ebb2b617af990
                                    • Instruction Fuzzy Hash: 64210375604204DFCB15DF68D580B26BFB9FB88324F20C969D9890F256D33BD406CAA1
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2787164736.000000000156D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0156D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_156d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 395e43eff318f161ada2d1a86243109eaaf0bca53fe4a293d4cd7d9300c8029c
                                    • Instruction ID: bed918291da03b5c45d0c9a1838c39bd5ac9f0eec7f1bc434a592506cd3f78f6
                                    • Opcode Fuzzy Hash: 395e43eff318f161ada2d1a86243109eaaf0bca53fe4a293d4cd7d9300c8029c
                                    • Instruction Fuzzy Hash: 162183755093808FD703CF24D594715BF71FB46214F28C5DAD8898F267C33A980ACBA2
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2771610541.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_155d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 84b5f7d1cce7c3b99e878a71d7fddede82baf5ff058d18f6f2326696a28e66da
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 3B11AF76504240CFDB16CF54D5C4B1ABF71FB88318F2486AADD490F656C33AD45ACBA2
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.2771610541.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_155d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 135dc40a949cf629af2b14226e7ad391144fff9ff9b63e41737bee1ad8fa9709
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 7711DF72404240CFDB02CF44D5C4B5ABF72FB84320F24C5AADD090B656C33AE45ACBA2

                                    Execution Graph

                                    Execution Coverage:19.6%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:74
                                    Total number of Limit Nodes:0
                                    execution_graph 11160 1358390 11161 135839c 11160->11161 11165 135bb30 11161->11165 11171 135bb20 11161->11171 11162 13583ae 11166 135bb4c 11165->11166 11177 135bbf4 11166->11177 11189 135bbf8 11166->11189 11201 135bf4e 11166->11201 11167 135bb5c 11167->11162 11172 135bb4c 11171->11172 11174 135bbf4 5 API calls 11172->11174 11175 135bf4e 3 API calls 11172->11175 11176 135bbf8 5 API calls 11172->11176 11173 135bb5c 11173->11162 11174->11173 11175->11173 11176->11173 11181 135bc1a 11177->11181 11178 135bec3 11216 135a884 11178->11216 11180 135a884 CloseHandle 11180->11178 11181->11178 11182 135be4c 11181->11182 11183 135bc68 11181->11183 11208 135d241 11181->11208 11212 135d248 11181->11212 11182->11180 11183->11167 11184 135bf08 11184->11183 11220 135d528 11184->11220 11224 135d530 11184->11224 11190 135bc1a 11189->11190 11191 135bc68 11190->11191 11192 135bec3 11190->11192 11195 135be4c 11190->11195 11197 135d241 CheckRemoteDebuggerPresent 11190->11197 11198 135d248 CheckRemoteDebuggerPresent 11190->11198 11191->11167 11193 135a884 CloseHandle 11192->11193 11196 135bf08 11193->11196 11194 135a884 CloseHandle 11194->11192 11195->11194 11196->11191 11199 135d530 EnumWindows 11196->11199 11200 135d528 EnumWindows 11196->11200 11197->11195 11198->11195 11199->11191 11200->11191 11202 135becd 11201->11202 11203 135a884 CloseHandle 11202->11203 11205 135bf08 11203->11205 11204 135bf3d 11204->11167 11205->11204 11206 135d530 EnumWindows 11205->11206 11207 135d528 EnumWindows 11205->11207 11206->11204 11207->11204 11209 135d290 CheckRemoteDebuggerPresent 11208->11209 11211 135d2c5 11209->11211 11211->11182 11213 135d290 CheckRemoteDebuggerPresent 11212->11213 11215 135d2c5 11213->11215 11215->11182 11217 135d308 CloseHandle 11216->11217 11219 135d376 11217->11219 11219->11184 11221 135d571 EnumWindows 11220->11221 11223 135d5b7 11221->11223 11223->11183 11225 135d571 EnumWindows 11224->11225 11227 135d5b7 11225->11227 11227->11183 11228 135eaf0 11229 135eb3b ReadProcessMemory 11228->11229 11231 135eb7f 11229->11231 11236 135ea00 11237 135ea48 WriteProcessMemory 11236->11237 11239 135ea9f 11237->11239 11240 135e940 11241 135e980 VirtualAllocEx 11240->11241 11243 135e9bd 11241->11243 11232 135e7b8 11233 135e7f8 ResumeThread 11232->11233 11235 135e829 11233->11235 11244 135ec88 11245 135ed11 CreateProcessA 11244->11245 11247 135eed3 11245->11247 11247->11247 11248 1354ae8 11249 1354b12 LdrInitializeThunk 11248->11249 11251 1354e87 11249->11251 11252 135e868 11253 135e8ad Wow64SetThreadContext 11252->11253 11255 135e8f5 11253->11255

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 1354ae8-1354eb7 LdrInitializeThunk 44 1354f13-1354f25 0->44 45 1354eb9-1354ebe 0->45 56 1354f37-1354fa0 44->56 46 1354ec2-1354ecd 45->46 48 1354f27-1354f2c 46->48 49 1354ecf-1354ed4 46->49 48->56 50 1354ed6-1354edf 49->50 51 1354eff-1354f06 49->51 50->48 55 1354ee1-1354efd 50->55 51->46 52 1354f08-1354f11 51->52 52->44 52->45 55->52 687 1354fa5 call 1357ee7 56->687 688 1354fa5 call 1357ef8 56->688 61 1354fab-1354fc7 689 1354fcc call 1357ee7 61->689 690 1354fcc call 1357ef8 61->690 63 1354fd2-1357788 550 1357ecf-1357ed4 63->550 551 135778e-13577d5 63->551 555 1357edf-1357ee6 550->555 557 13577db-1357958 551->557 582 135795f-135796a 557->582 584 135796c-1357977 582->584 585 1357979-135797d 582->585 584->585 586 1357e75-1357e77 585->586 587 1357983-1357992 585->587 589 1357e93-1357e95 586->589 590 1357e79-1357e7d 586->590 597 1357994-13579a3 587->597 598 13579d8-1357b18 587->598 593 1357e97-1357ea9 589->593 594 1357eab-1357eaf 589->594 590->589 592 1357e7f-1357e91 590->592 596 1357ec3-1357ec7 592->596 593->596 595 1357eb1-1357ebc 594->595 594->596 595->596 596->557 600 1357ecd 596->600 605 1357bc7-1357bcb 597->605 606 13579a9-13579b8 597->606 598->586 676 1357b1e-1357bc2 598->676 600->555 607 1357c77-1357c7b 605->607 608 1357bd1-1357c72 605->608 612 1357c91-1357d5e 606->612 613 13579be-13579cd 606->613 607->586 610 1357c81-1357c8c 607->610 608->586 610->586 612->586 621 1357d63-1357d67 613->621 622 13579d3 613->622 624 1357e46-1357e6e 621->624 625 1357d6d-1357e44 621->625 622->586 624->586 625->586 676->586 687->61 688->61 689->63 690->63
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: ($($-$.$F$U
                                    • API String ID: 2994545307-2826122012
                                    • Opcode ID: 25b192d17137a890660b7554c01352b576db40f320f810e9083223e1373c06c4
                                    • Instruction ID: 560e5ef614cdd11398815da97fd60aa358a6746fb0edc0207fb06ace948c8d44
                                    • Opcode Fuzzy Hash: 25b192d17137a890660b7554c01352b576db40f320f810e9083223e1373c06c4
                                    • Instruction Fuzzy Hash: 2F532F74A402198FCB54DF69DD94A9EB7BABF88300F1085DDD90DAB369DA306E84CF44

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 691 1354ad8-1354e5e 730 1354e68-1354e7d LdrInitializeThunk 691->730 731 1354e87-1354eb7 730->731 735 1354f13-1354f25 731->735 736 1354eb9-1354ebe 731->736 747 1354f37-1354f3c 735->747 737 1354ec2-1354ecd 736->737 739 1354f27-1354f2c 737->739 740 1354ecf-1354ed4 737->740 739->747 741 1354ed6-1354edf 740->741 742 1354eff-1354f06 740->742 741->739 746 1354ee1-1354efd 741->746 742->737 743 1354f08-1354f11 742->743 743->735 743->736 746->743 749 1354f46-1354f6f 747->749 751 1354f79-1354fa0 749->751 1378 1354fa5 call 1357ee7 751->1378 1379 1354fa5 call 1357ef8 751->1379 752 1354fab-1354fb7 753 1354fc1-1354fc7 752->753 1380 1354fcc call 1357ee7 753->1380 1381 1354fcc call 1357ef8 753->1381 754 1354fd2-1354fde 755 1354fe8-1354feb 754->755 756 1354ff3-1357788 755->756 1241 1357ecf-1357ed4 756->1241 1242 135778e-13577b8 756->1242 1246 1357edf-1357ee6 1241->1246 1247 13577c0-13577d5 1242->1247 1248 13577db-1357947 1247->1248 1271 1357951-1357958 1248->1271 1273 135795f-135796a 1271->1273 1275 135796c-1357977 1273->1275 1276 1357979-135797d 1273->1276 1275->1276 1277 1357e75-1357e77 1276->1277 1278 1357983-1357992 1276->1278 1280 1357e93-1357e95 1277->1280 1281 1357e79-1357e7d 1277->1281 1288 1357994-13579a3 1278->1288 1289 13579d8-1357b18 1278->1289 1284 1357e97-1357ea9 1280->1284 1285 1357eab-1357eaf 1280->1285 1281->1280 1283 1357e7f-1357e91 1281->1283 1287 1357ec3-1357ec7 1283->1287 1284->1287 1286 1357eb1-1357ebc 1285->1286 1285->1287 1286->1287 1287->1248 1291 1357ecd 1287->1291 1296 1357bc7-1357bcb 1288->1296 1297 13579a9-13579b8 1288->1297 1289->1277 1367 1357b1e-1357bc2 1289->1367 1291->1246 1298 1357c77-1357c7b 1296->1298 1299 1357bd1-1357c72 1296->1299 1303 1357c91-1357d5e 1297->1303 1304 13579be-13579cd 1297->1304 1298->1277 1301 1357c81-1357c8c 1298->1301 1299->1277 1301->1277 1303->1277 1312 1357d63-1357d67 1304->1312 1313 13579d3 1304->1313 1315 1357e46-1357e6e 1312->1315 1316 1357d6d-1357e44 1312->1316 1313->1277 1315->1277 1316->1277 1367->1277 1378->752 1379->752 1380->754 1381->754
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: ($($-$.$F$U
                                    • API String ID: 2994545307-2826122012
                                    • Opcode ID: 5e9cf481c4978354d5534152109a31e6a4421156858c25f3715dab6703634855
                                    • Instruction ID: ab8c6fb9a099277ac299e50a0165ad9fa24c28b978348f07462b6b62b9749803
                                    • Opcode Fuzzy Hash: 5e9cf481c4978354d5534152109a31e6a4421156858c25f3715dab6703634855
                                    • Instruction Fuzzy Hash: 1E432F74A402298FCB54DF69DD94A9DB7BABF88300F1085DDD80DAB369DA306E84CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1382 1350720-1350721 1383 1350794-135079a 1382->1383 1384 1350723 1382->1384 1385 1350785-135078b 1383->1385 1386 135079c-135079e 1383->1386 1384->1385 1385->1383 1389 1350811-1350812 1386->1389 1390 13507a0-13507ab 1386->1390 1392 1350814-135081a 1389->1392 1393 13507de 1389->1393 1390->1393 1396 135088d-135089e 1392->1396 1397 135081c-1350823 1392->1397 1394 1350851 1393->1394 1395 13507e0-13507e7 1393->1395 1482 1350853 call 1350805 1394->1482 1483 1350853 call 13507b1 1394->1483 1484 1350853 call 1350860 1394->1484 1485 1350853 call 1350720 1394->1485 1486 1350853 call 13506bc 1394->1486 1487 1350853 call 135064f 1394->1487 1488 1350853 call 13506a8 1394->1488 1395->1389 1398 13508a4 1396->1398 1399 13508a0-13508a3 1396->1399 1397->1394 1402 13508a6-13508a7 1398->1402 1403 13508aa-13508af 1398->1403 1399->1398 1401 1350859-135085a 1404 1350cf3-1350d90 VirtualProtect 1402->1404 1405 13508a8 1402->1405 1406 13508b1-13508b8 1403->1406 1407 13508b9-13508bb 1403->1407 1420 1350d92-1350d98 1404->1420 1421 1350d99-1350dba 1404->1421 1405->1403 1408 13508bc-1350907 1406->1408 1407->1408 1413 13509b2-13509dd 1408->1413 1414 135090d-1350921 1408->1414 1433 13509e0-13509e8 1413->1433 1416 1350923-1350927 1414->1416 1417 135094e-1350950 1414->1417 1418 135092e 1416->1418 1419 1350929-135092c 1416->1419 1422 13509a0-13509ac 1417->1422 1423 1350952-1350956 1417->1423 1425 1350931-135093d 1418->1425 1419->1425 1420->1421 1422->1413 1422->1414 1426 135095d 1423->1426 1427 1350958-135095b 1423->1427 1429 1350943 1425->1429 1430 135093f-1350941 1425->1430 1432 1350960-1350978 1426->1432 1427->1432 1434 1350946-135094c 1429->1434 1430->1434 1432->1422 1435 135097a-135099e 1432->1435 1433->1404 1436 13509ee-13509fd 1433->1436 1434->1422 1435->1422 1435->1435 1436->1404 1437 1350a03-1350a3d 1436->1437 1437->1433 1438 1350a3f-1350a48 1437->1438 1438->1404 1439 1350a4e-1350a5d 1438->1439 1439->1404 1440 1350a63-1350a6f 1439->1440 1440->1404 1441 1350a75-1350a81 1440->1441 1441->1404 1442 1350a87-1350a94 1441->1442 1442->1404 1443 1350a9a-1350aa3 1442->1443 1443->1404 1444 1350aa9-1350ab5 1443->1444 1444->1404 1445 1350abb-1350ac4 1444->1445 1445->1404 1446 1350aca-1350ad6 1445->1446 1446->1404 1447 1350adc-1350ae5 1446->1447 1447->1404 1448 1350aeb-1350af8 1447->1448 1448->1404 1449 1350afe-1350b07 1448->1449 1449->1404 1450 1350b0d-1350b19 1449->1450 1450->1404 1451 1350b1f-1350b28 1450->1451 1451->1404 1452 1350b2e-1350b3a 1451->1452 1452->1404 1453 1350b40-1350b49 1452->1453 1453->1404 1454 1350b4f-1350b5c 1453->1454 1454->1404 1455 1350b62-1350b6b 1454->1455 1455->1404 1456 1350b71-1350b7d 1455->1456 1456->1404 1457 1350b83-1350b8c 1456->1457 1457->1404 1458 1350b92-1350b9e 1457->1458 1458->1404 1459 1350ba4-1350bad 1458->1459 1459->1404 1460 1350bb3-1350bc0 1459->1460 1460->1404 1461 1350bc6-1350bcf 1460->1461 1461->1404 1462 1350bd5-1350be1 1461->1462 1462->1404 1463 1350be7-1350bf0 1462->1463 1463->1404 1464 1350bf6-1350c02 1463->1464 1464->1404 1465 1350c08-1350c11 1464->1465 1465->1404 1466 1350c17-1350c24 1465->1466 1466->1404 1467 1350c2a-1350c33 1466->1467 1467->1404 1468 1350c39-1350c45 1467->1468 1468->1404 1469 1350c4b-1350c54 1468->1469 1469->1404 1470 1350c5a-1350c63 1469->1470 1470->1404 1471 1350c69-1350c83 call 1350464 1470->1471 1473 1350c88-1350c8c 1471->1473 1474 1350c96-1350c9e 1473->1474 1475 1350c8e-1350c95 1473->1475 1476 1350ca0 1474->1476 1477 1350ceb-1350cf2 1474->1477 1478 1350ca3-1350cad 1476->1478 1478->1404 1479 1350caf-1350cc8 1478->1479 1479->1404 1480 1350cca-1350cde 1479->1480 1480->1404 1481 1350ce0-1350ce9 1480->1481 1481->1477 1481->1478 1482->1401 1483->1401 1484->1401 1485->1401 1486->1401 1487->1401 1488->1401
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @
                                    • API String ID: 0-2766056989
                                    • Opcode ID: 2771afbbecb63f341fcc4801956a009fbca0519ee76587085767a93b22ac7561
                                    • Instruction ID: a301166f74b8337cc47a58c58a1b626f36a378645a961ecb048a5a2adadc3ae3
                                    • Opcode Fuzzy Hash: 2771afbbecb63f341fcc4801956a009fbca0519ee76587085767a93b22ac7561
                                    • Instruction Fuzzy Hash: EB020971E002098FDB68CF98C490AADBBB2FF49714F64855AEC15EB249D335ED81CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1615 135ec7d-135ed1d 1618 135ed56-135ed76 1615->1618 1619 135ed1f-135ed29 1615->1619 1624 135edaf-135edde 1618->1624 1625 135ed78-135ed82 1618->1625 1619->1618 1620 135ed2b-135ed2d 1619->1620 1622 135ed50-135ed53 1620->1622 1623 135ed2f-135ed39 1620->1623 1622->1618 1626 135ed3d-135ed4c 1623->1626 1627 135ed3b 1623->1627 1633 135ee17-135eed1 CreateProcessA 1624->1633 1634 135ede0-135edea 1624->1634 1625->1624 1629 135ed84-135ed86 1625->1629 1626->1626 1628 135ed4e 1626->1628 1627->1626 1628->1622 1630 135eda9-135edac 1629->1630 1631 135ed88-135ed92 1629->1631 1630->1624 1635 135ed94 1631->1635 1636 135ed96-135eda5 1631->1636 1647 135eed3-135eed9 1633->1647 1648 135eeda-135ef60 1633->1648 1634->1633 1637 135edec-135edee 1634->1637 1635->1636 1636->1636 1638 135eda7 1636->1638 1639 135ee11-135ee14 1637->1639 1640 135edf0-135edfa 1637->1640 1638->1630 1639->1633 1642 135edfc 1640->1642 1643 135edfe-135ee0d 1640->1643 1642->1643 1643->1643 1644 135ee0f 1643->1644 1644->1639 1647->1648 1658 135ef70-135ef74 1648->1658 1659 135ef62-135ef66 1648->1659 1661 135ef84-135ef88 1658->1661 1662 135ef76-135ef7a 1658->1662 1659->1658 1660 135ef68-135ef6b call 13580a8 1659->1660 1660->1658 1665 135ef98-135ef9c 1661->1665 1666 135ef8a-135ef8e 1661->1666 1662->1661 1664 135ef7c-135ef7f call 13580a8 1662->1664 1664->1661 1669 135efae-135efb5 1665->1669 1670 135ef9e-135efa4 1665->1670 1666->1665 1668 135ef90-135ef93 call 13580a8 1666->1668 1668->1665 1671 135efb7-135efc6 1669->1671 1672 135efcc 1669->1672 1670->1669 1671->1672 1675 135efcd 1672->1675 1675->1675
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0135EEBE
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 19643f087b23f681c3b05ec42ea03747a7a4945939ae0e2f4db06eabdc2db8be
                                    • Instruction ID: d67683018be7f7affc07bf3a8c2995b33e5926d0e7f3b2a606651f141b9cabf5
                                    • Opcode Fuzzy Hash: 19643f087b23f681c3b05ec42ea03747a7a4945939ae0e2f4db06eabdc2db8be
                                    • Instruction Fuzzy Hash: 9FA14A71D002198FEB64CF68C841B9DFBB2BF48714F1485AAD818A7250DB759A85CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1676 135ec88-135ed1d 1678 135ed56-135ed76 1676->1678 1679 135ed1f-135ed29 1676->1679 1684 135edaf-135edde 1678->1684 1685 135ed78-135ed82 1678->1685 1679->1678 1680 135ed2b-135ed2d 1679->1680 1682 135ed50-135ed53 1680->1682 1683 135ed2f-135ed39 1680->1683 1682->1678 1686 135ed3d-135ed4c 1683->1686 1687 135ed3b 1683->1687 1693 135ee17-135eed1 CreateProcessA 1684->1693 1694 135ede0-135edea 1684->1694 1685->1684 1689 135ed84-135ed86 1685->1689 1686->1686 1688 135ed4e 1686->1688 1687->1686 1688->1682 1690 135eda9-135edac 1689->1690 1691 135ed88-135ed92 1689->1691 1690->1684 1695 135ed94 1691->1695 1696 135ed96-135eda5 1691->1696 1707 135eed3-135eed9 1693->1707 1708 135eeda-135ef60 1693->1708 1694->1693 1697 135edec-135edee 1694->1697 1695->1696 1696->1696 1698 135eda7 1696->1698 1699 135ee11-135ee14 1697->1699 1700 135edf0-135edfa 1697->1700 1698->1690 1699->1693 1702 135edfc 1700->1702 1703 135edfe-135ee0d 1700->1703 1702->1703 1703->1703 1704 135ee0f 1703->1704 1704->1699 1707->1708 1718 135ef70-135ef74 1708->1718 1719 135ef62-135ef66 1708->1719 1721 135ef84-135ef88 1718->1721 1722 135ef76-135ef7a 1718->1722 1719->1718 1720 135ef68-135ef6b call 13580a8 1719->1720 1720->1718 1725 135ef98-135ef9c 1721->1725 1726 135ef8a-135ef8e 1721->1726 1722->1721 1724 135ef7c-135ef7f call 13580a8 1722->1724 1724->1721 1729 135efae-135efb5 1725->1729 1730 135ef9e-135efa4 1725->1730 1726->1725 1728 135ef90-135ef93 call 13580a8 1726->1728 1728->1725 1731 135efb7-135efc6 1729->1731 1732 135efcc 1729->1732 1730->1729 1731->1732 1735 135efcd 1732->1735 1735->1735
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0135EEBE
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: e92e2f8e85d5e3e65925764d957b35bd77bf3c44906121edf05c543ba6605817
                                    • Instruction ID: c816c7cbba8b1b264e51355b3ccb370933e73fce74ee1726a5702cf2da5cb57b
                                    • Opcode Fuzzy Hash: e92e2f8e85d5e3e65925764d957b35bd77bf3c44906121edf05c543ba6605817
                                    • Instruction Fuzzy Hash: 41915971D002198FEB64CF68C841BADFBB2BF48714F1485AAD818A7290DB749A85CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1736 135ea00-135ea4e 1738 135ea50-135ea5c 1736->1738 1739 135ea5e-135ea9d WriteProcessMemory 1736->1739 1738->1739 1741 135eaa6-135ead6 1739->1741 1742 135ea9f-135eaa5 1739->1742 1742->1741
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0135EA90
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 1d62d91de26e4cebc489297198188d1bc060d2091af1eac2d69d455aa5093728
                                    • Instruction ID: 23da9cc5e304bbc7d47a3a26ced86d8a2fe9a07d87956b159758d5e2e6d5ee70
                                    • Opcode Fuzzy Hash: 1d62d91de26e4cebc489297198188d1bc060d2091af1eac2d69d455aa5093728
                                    • Instruction Fuzzy Hash: CB2105B59003499FDB10DFAAC885BEEBBF5FF48314F10842AE919A7250D7789944CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1746 135e9f8-135ea4e 1748 135ea50-135ea5c 1746->1748 1749 135ea5e-135ea9d WriteProcessMemory 1746->1749 1748->1749 1751 135eaa6-135ead6 1749->1751 1752 135ea9f-135eaa5 1749->1752 1752->1751
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0135EA90
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: bdd357aa22e61f9d48d49082eef53994179031b61146e3c17af3463b191ccf67
                                    • Instruction ID: bac54981e24f005fb292550f2c19bdb61e0962886467797b928b60188758c845
                                    • Opcode Fuzzy Hash: bdd357aa22e61f9d48d49082eef53994179031b61146e3c17af3463b191ccf67
                                    • Instruction Fuzzy Hash: F02128B5D003099FDB50DFA9C985BEEBBF5FF48310F10882AE919A7250D7789544CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1756 135eaeb-135eb7d ReadProcessMemory 1760 135eb86-135ebb6 1756->1760 1761 135eb7f-135eb85 1756->1761 1761->1760
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0135EB70
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 85316a467f9ac4bb7d9021ae69003023a7751f1d6f39c4532e1c67b10dc69399
                                    • Instruction ID: ad1872e5124d421e2094f4710f13a07772c933c6abe56ea14244b879ab550260
                                    • Opcode Fuzzy Hash: 85316a467f9ac4bb7d9021ae69003023a7751f1d6f39c4532e1c67b10dc69399
                                    • Instruction Fuzzy Hash: A52109B1C003499FDB10DFAAC885AEEFBF5FF48320F508429E919A7250C7789544DBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1765 135e868-135e8b3 1767 135e8b5-135e8c1 1765->1767 1768 135e8c3-135e8f3 Wow64SetThreadContext 1765->1768 1767->1768 1770 135e8f5-135e8fb 1768->1770 1771 135e8fc-135e92c 1768->1771 1770->1771
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0135E8E6
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 6471ed69193b7172257f0e92a0116c433839908ce52501ae42c339e6d864d632
                                    • Instruction ID: 7251173946f1b01bceec77ac01d909c3b4afbce0805eded85eb7f842649e6476
                                    • Opcode Fuzzy Hash: 6471ed69193b7172257f0e92a0116c433839908ce52501ae42c339e6d864d632
                                    • Instruction Fuzzy Hash: AC21F5B1D002098FDB50DFAAC485BAEBFF4EF48714F148429D519A7240CB789A44CBA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1775 135eaf0-135eb7d ReadProcessMemory 1778 135eb86-135ebb6 1775->1778 1779 135eb7f-135eb85 1775->1779 1779->1778
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0135EB70
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 9dd2688d99ed53ad8cfdf0bdb20f2e10918aa74cd45fc08250d967a5c7748031
                                    • Instruction ID: c65dd26ec5cbfc71e1bb24afc23981f8426fcd8028751f444e49fe067efb980b
                                    • Opcode Fuzzy Hash: 9dd2688d99ed53ad8cfdf0bdb20f2e10918aa74cd45fc08250d967a5c7748031
                                    • Instruction Fuzzy Hash: 002109B1C003499FDB10DFAAC845AEEFBF5FF48310F508429E919A7250C7789544DBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1783 135e860-135e8b3 1785 135e8b5-135e8c1 1783->1785 1786 135e8c3-135e8c6 1783->1786 1785->1786 1787 135e8cd-135e8f3 Wow64SetThreadContext 1786->1787 1788 135e8f5-135e8fb 1787->1788 1789 135e8fc-135e92c 1787->1789 1788->1789
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0135E8E6
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: cb720f3c977e750d9fae68c3d1f6bcf82ffe5e39aac099c708e13bcf6c4faf92
                                    • Instruction ID: c746c77b6b988e5136cdce845f65aeb8135ccb5380a620030ca7248752965418
                                    • Opcode Fuzzy Hash: cb720f3c977e750d9fae68c3d1f6bcf82ffe5e39aac099c708e13bcf6c4faf92
                                    • Instruction Fuzzy Hash: 642123B1D003098FDB50DFAAC585BAEFBF5EF48724F14842AD519A7240DB789A45CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1793 135d528-135d577 1795 135d583-135d5b5 EnumWindows 1793->1795 1796 135d579 1793->1796 1799 135d5b7-135d5bd 1795->1799 1800 135d5be-135d5eb 1795->1800 1797 135d581 1796->1797 1797->1795 1799->1800
                                    APIs
                                    • EnumWindows.USER32(00000000,?), ref: 0135D5A8
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: EnumWindows
                                    • String ID:
                                    • API String ID: 1129996299-0
                                    • Opcode ID: b39b4996bb2c835853fff5b423d6ef3eb9a7ee55704bee956e9e5de74cf82a55
                                    • Instruction ID: 53bf34936fb969828f7e4c2e00f4e5ece4f73488ba7c5782a824a9c19cd056ce
                                    • Opcode Fuzzy Hash: b39b4996bb2c835853fff5b423d6ef3eb9a7ee55704bee956e9e5de74cf82a55
                                    • Instruction Fuzzy Hash: A32127B1D002098FDB14DFAAC944BEFFBF5AF88314F14842AD515A7290CB799945CFA4
                                    APIs
                                    • EnumWindows.USER32(00000000,?), ref: 0135D5A8
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: EnumWindows
                                    • String ID:
                                    • API String ID: 1129996299-0
                                    • Opcode ID: 412a8138807bb16cccd4effc64319056a7007c4a5bb360821530b769a10a2302
                                    • Instruction ID: dd884be8ea17482065fbe1e9440a499588711f82be56053675ac72fc15679416
                                    • Opcode Fuzzy Hash: 412a8138807bb16cccd4effc64319056a7007c4a5bb360821530b769a10a2302
                                    • Instruction Fuzzy Hash: 612115B1D002098FDB14DFAAC945BAEFBF5AF88314F10842AD515A7250CB79A944CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1805 1350d09-1350d90 VirtualProtect 1808 1350d92-1350d98 1805->1808 1809 1350d99-1350dba 1805->1809 1808->1809
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01350D83
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 086b9c7179e387cd969ef9f2baf6be557a2fa77496cbe8c7b33b82b924345ac2
                                    • Instruction ID: 3efa014f91d83ff35b779b77fdb733fe9970bfe38d3300bb3b5db07817fd7abd
                                    • Opcode Fuzzy Hash: 086b9c7179e387cd969ef9f2baf6be557a2fa77496cbe8c7b33b82b924345ac2
                                    • Instruction Fuzzy Hash: 4921E2B59002499FDB10DFAAC484ADEFBF4BF49324F108429E958A7251D379A544CFA1
                                    APIs
                                    • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0135D2B6
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: 8deeb647cd4cde5244d2af4a9ddb9c2a38eebf7182ffee512650f26c65717423
                                    • Instruction ID: 2f82e237f8c36fdce38382ef04a4c39e4d88201149ea599eb9231f33d7710cb2
                                    • Opcode Fuzzy Hash: 8deeb647cd4cde5244d2af4a9ddb9c2a38eebf7182ffee512650f26c65717423
                                    • Instruction Fuzzy Hash: D21114B1D002498EDB10DFAAC584AAFFBF4FF48324F10842AD519A7250CB78A944CFA0
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01350D83
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 84720e540f2c6524c1d1227bea15e159c64d4850ac2b86088909733c51b39746
                                    • Instruction ID: a0b91e990cb85f236c197611527a3295658254809bd28eba1ae3530ade8defec
                                    • Opcode Fuzzy Hash: 84720e540f2c6524c1d1227bea15e159c64d4850ac2b86088909733c51b39746
                                    • Instruction Fuzzy Hash: DC21E4B59002499FDB10DF9AC884BDEFBF8FF48320F108429E958A7250D779A544CFA5
                                    APIs
                                    • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0135D2B6
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: a0e028321188be9844f6da0c340bb8db4a278074ea23fc1c5eaad8dd540e0e2f
                                    • Instruction ID: c96877d982c857f569db56871bb7c460b9282a3c1131e6a77f0c477ec4df7743
                                    • Opcode Fuzzy Hash: a0e028321188be9844f6da0c340bb8db4a278074ea23fc1c5eaad8dd540e0e2f
                                    • Instruction Fuzzy Hash: 8311E7B1D002098FDB10DFAAC444AAFFBF4EF48724F50842AD519A7250CB79A944CFA5
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0135E9AE
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 4403543f5bd1e8619169589ec7d474a2099516f8f67c0e9eaaf1819a2e02b7ad
                                    • Instruction ID: 78082a92883d10c80158d74c0743a028760e44431714c58c5a353cac8ee3e261
                                    • Opcode Fuzzy Hash: 4403543f5bd1e8619169589ec7d474a2099516f8f67c0e9eaaf1819a2e02b7ad
                                    • Instruction Fuzzy Hash: 231137B19002499FDB10DFAAC844AEFFFF5EF48324F108419E519A7250CB79A544CFA0
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0135E9AE
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: d659f1fd63d62d650106178bd5dd54caad1a000b33db53c8c1dd760942979b9d
                                    • Instruction ID: 685d7441b2c57f5a80771bb23fe22f6f39cf936e5c96d072642b90d3a8e74b93
                                    • Opcode Fuzzy Hash: d659f1fd63d62d650106178bd5dd54caad1a000b33db53c8c1dd760942979b9d
                                    • Instruction Fuzzy Hash: 091126B59002099FDB10DFA9C945AEEFBF5EF48324F208819E519A7250CB799544CFA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: bef51f26e8ce5a527539bde4338fd7f931500fb7d2cdc1211029473f529c6724
                                    • Instruction ID: 48216de961a629d015593f3709139e7b127e78e92200f6c0daeb1d7fe7d19659
                                    • Opcode Fuzzy Hash: bef51f26e8ce5a527539bde4338fd7f931500fb7d2cdc1211029473f529c6724
                                    • Instruction Fuzzy Hash: CC1128B1D002488FDB14DFAAC845BAEFFF5EF88724F248429D519A7250CB79A544CBA4
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 403a7d7516a793a4e9d501e0a838c64f1455aa3c888932107d2275d557d76ae3
                                    • Instruction ID: a5b5dcfb7efb487e3c754cd699a9c525ffccefe6c037f1c0ef871557d68974af
                                    • Opcode Fuzzy Hash: 403a7d7516a793a4e9d501e0a838c64f1455aa3c888932107d2275d557d76ae3
                                    • Instruction Fuzzy Hash: 5B1128B5D003488FDB14DFAAC5457EEFBF5AF48724F24882AD519A7250CB38A544CBA4
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0135D367
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 4d470789c6f857bc9067432589dd668348ce2d2225a98d17f90d99b3cc51865d
                                    • Instruction ID: f418bbfff2ef8a94256b955e8da6916e163e031cda5ee591b7dcdd10fbe782f2
                                    • Opcode Fuzzy Hash: 4d470789c6f857bc9067432589dd668348ce2d2225a98d17f90d99b3cc51865d
                                    • Instruction Fuzzy Hash: 4B1103B5800248CFDB10DF99D444BDEBBF4EB48714F20841AD518A7750C378A944CFA5
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0135D367
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3340393180.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1350000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 9bb5a0cc0b71e23c4c5c3dc8f17bf1d961f79e77ae0b9332c258add62d2045ee
                                    • Instruction ID: 25dd367f61126f43f0f04b4970576549f4a04c6bac29bff79403f55522540982
                                    • Opcode Fuzzy Hash: 9bb5a0cc0b71e23c4c5c3dc8f17bf1d961f79e77ae0b9332c258add62d2045ee
                                    • Instruction Fuzzy Hash: D11103B5800349CFCB50DF9AD444B9EFBF8EB48724F20845AD918A7351C778A944CFA5
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3339896304.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_130d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ed85675a8e2a9a120b13c22e5fa883aa4300d336934f8bea72e0915b65a8f051
                                    • Instruction ID: 04567d843860181827432af1e108f7a2bd3f429d6a94ffab08c5932d909d3088
                                    • Opcode Fuzzy Hash: ed85675a8e2a9a120b13c22e5fa883aa4300d336934f8bea72e0915b65a8f051
                                    • Instruction Fuzzy Hash: AC21F5705042449FD716DFA8D594B26BBE9FB84358F20C56DD90D4B692C33AD807C661
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.3339896304.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_130d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 93d49e4a1442b6ae817b54e6d01109cf66e3cf9bb30be93c629efda23a912acd
                                    • Instruction ID: 0c685aa4429a443d3eef04b6a573d4a99ea652a096fdb864500800ffef53db32
                                    • Opcode Fuzzy Hash: 93d49e4a1442b6ae817b54e6d01109cf66e3cf9bb30be93c629efda23a912acd
                                    • Instruction Fuzzy Hash: 6911DA75504280CFDB12DF58CA98B15BFA1FB84218F24C6AAD8494B692C33AD80ACB52

                                    Execution Graph

                                    Execution Coverage:6.2%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:20
                                    Total number of Limit Nodes:4
                                    execution_graph 14721 ffd5e8 14722 ffd62a 14721->14722 14723 ffd630 GetModuleHandleW 14721->14723 14722->14723 14724 ffd65d 14723->14724 14725 ff7768 14726 ff772d DuplicateHandle 14725->14726 14728 ff776b 14725->14728 14727 ff773e 14726->14727 14717 fff9f0 14718 fffa58 CreateWindowExW 14717->14718 14720 fffb14 14718->14720 14729 ff7460 14730 ff74a6 GetCurrentProcess 14729->14730 14732 ff74f8 GetCurrentThread 14730->14732 14733 ff74f1 14730->14733 14734 ff752e 14732->14734 14735 ff7535 GetCurrentProcess 14732->14735 14733->14732 14734->14735 14738 ff756b 14735->14738 14736 ff7593 GetCurrentThreadId 14737 ff75c4 14736->14737 14738->14736

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 794 ff740f-ff7434 795 ff7436-ff7447 794->795 796 ff7494-ff74ef GetCurrentProcess 794->796 795->796 801 ff74f8-ff752c GetCurrentThread 796->801 802 ff74f1-ff74f7 796->802 803 ff752e-ff7534 801->803 804 ff7535-ff7569 GetCurrentProcess 801->804 802->801 803->804 805 ff756b-ff7571 804->805 806 ff7572-ff758d call ff763b 804->806 805->806 810 ff7593-ff75c2 GetCurrentThreadId 806->810 811 ff75cb-ff762d 810->811 812 ff75c4-ff75ca 810->812 812->811
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 00FF74DE
                                    • GetCurrentThread.KERNEL32 ref: 00FF751B
                                    • GetCurrentProcess.KERNEL32 ref: 00FF7558
                                    • GetCurrentThreadId.KERNEL32 ref: 00FF75B1
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.3034728055.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_ff0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 52101bf0b1528176a2f9ae85752ce99aa5af985afd601b76add0b081b9c307c2
                                    • Instruction ID: 7c2641d20ba02308c772b0355b85d541fcde2119e0f308c6c8f612b06a1794ee
                                    • Opcode Fuzzy Hash: 52101bf0b1528176a2f9ae85752ce99aa5af985afd601b76add0b081b9c307c2
                                    • Instruction Fuzzy Hash: 5251BDB0D043498FDB18DFA9D548BAEBFF1FF49314F288499D109A7262C778A845CB61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 841 ff7460-ff74ef GetCurrentProcess 845 ff74f8-ff752c GetCurrentThread 841->845 846 ff74f1-ff74f7 841->846 847 ff752e-ff7534 845->847 848 ff7535-ff7569 GetCurrentProcess 845->848 846->845 847->848 849 ff756b-ff7571 848->849 850 ff7572-ff758d call ff763b 848->850 849->850 854 ff7593-ff75c2 GetCurrentThreadId 850->854 855 ff75cb-ff762d 854->855 856 ff75c4-ff75ca 854->856 856->855
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 00FF74DE
                                    • GetCurrentThread.KERNEL32 ref: 00FF751B
                                    • GetCurrentProcess.KERNEL32 ref: 00FF7558
                                    • GetCurrentThreadId.KERNEL32 ref: 00FF75B1
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.3034728055.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_ff0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: af0fafa58444ba60f9a6657039c1dc2d56acbe1e2f84df4a54d3dc929e222411
                                    • Instruction ID: eea3719773927ae1719494d7e69454891baa236fec5436936b0d11676c176ffe
                                    • Opcode Fuzzy Hash: af0fafa58444ba60f9a6657039c1dc2d56acbe1e2f84df4a54d3dc929e222411
                                    • Instruction Fuzzy Hash: 505174B0D003498FDB14EFAAD548BAEBBF5FF48314F248459E109B7260D778A944CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 819 ff745b-ff74ef GetCurrentProcess 823 ff74f8-ff752c GetCurrentThread 819->823 824 ff74f1-ff74f7 819->824 825 ff752e-ff7534 823->825 826 ff7535-ff7569 GetCurrentProcess 823->826 824->823 825->826 827 ff756b-ff7571 826->827 828 ff7572-ff758d call ff763b 826->828 827->828 832 ff7593-ff75c2 GetCurrentThreadId 828->832 833 ff75cb-ff762d 832->833 834 ff75c4-ff75ca 832->834 834->833
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 00FF74DE
                                    • GetCurrentThread.KERNEL32 ref: 00FF751B
                                    • GetCurrentProcess.KERNEL32 ref: 00FF7558
                                    • GetCurrentThreadId.KERNEL32 ref: 00FF75B1
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.3034728055.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_ff0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: f7214af27e74ef37753b50c0ecac3d3dccd8f1462adf97af0d3dd47a5ccdaabc
                                    • Instruction ID: 4a6dc33cb17acc423d73d4a630bd80eabddb08dd94aef529aa6d80219e6d1e6f
                                    • Opcode Fuzzy Hash: f7214af27e74ef37753b50c0ecac3d3dccd8f1462adf97af0d3dd47a5ccdaabc
                                    • Instruction Fuzzy Hash: B15153B09003498FDB14DFA9D648BAEBBF1FF48314F248499E509B7260D778A944CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 894 fff9f0-fffa56 895 fffa58-fffa5e 894->895 896 fffa61-fffa68 894->896 895->896 897 fffa6a-fffa70 896->897 898 fffa73-fffb12 CreateWindowExW 896->898 897->898 900 fffb1b-fffb53 898->900 901 fffb14-fffb1a 898->901 905 fffb55-fffb58 900->905 906 fffb60 900->906 901->900 905->906
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00FFFB02
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.3034728055.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_ff0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 59784600e17367bb47ae8829efa1c7e6ae18d353346b6df1754e9bc9208aab2d
                                    • Instruction ID: c3df1263a94f57727d3c3f4877b62d6592978f1c97efd921a2a6f629b99f13ae
                                    • Opcode Fuzzy Hash: 59784600e17367bb47ae8829efa1c7e6ae18d353346b6df1754e9bc9208aab2d
                                    • Instruction Fuzzy Hash: CB41AFB1D00349DFDB14CF9AC994ADEBBB5BF88710F24812AE918AB220D7759945CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 907 ff7768-ff7769 908 ff772d-ff773c DuplicateHandle 907->908 909 ff776b-ff7896 907->909 910 ff773e-ff7744 908->910 911 ff7745-ff7762 908->911 910->911
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FF772F
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.3034728055.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_ff0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 9cc1612982da249af952a65ef03e9d0b96b912a725cb119ec0003e5af80c7780
                                    • Instruction ID: c0fcb8baecaf07ce1faff08159fc97d1a5e406daad22519d58435f27cb9fd88f
                                    • Opcode Fuzzy Hash: 9cc1612982da249af952a65ef03e9d0b96b912a725cb119ec0003e5af80c7780
                                    • Instruction Fuzzy Hash: 8D316DB5A403419FE724AF61E44977E7BB6F789744F208829EA468B389CB745C11CF21

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 930 ff76a8-ff773c DuplicateHandle 931 ff773e-ff7744 930->931 932 ff7745-ff7762 930->932 931->932
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FF772F
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.3034728055.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_ff0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 274daac05618d648668fd37fe92b6ef7b8cb025dc639f6fea4874b13b2e2523a
                                    • Instruction ID: 778f400e8c14575f6e9dddbb0b575f9b576f561c6baa8fff8726521f56f0ec2f
                                    • Opcode Fuzzy Hash: 274daac05618d648668fd37fe92b6ef7b8cb025dc639f6fea4874b13b2e2523a
                                    • Instruction Fuzzy Hash: 2E21B3B59002489FDB10DFAAD584AEEFBF9FB48710F14841AE918A3250D378A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 925 ff76a3-ff773c DuplicateHandle 926 ff773e-ff7744 925->926 927 ff7745-ff7762 925->927 926->927
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FF772F
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.3034728055.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_ff0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: b1ef72f0f0a80f3f798ade9e3c7b0fa7b8db396eb36a691d66c5d0a47dbd1c4d
                                    • Instruction ID: a4414729f341a6b052b75fa4234894405d2d009cea1fdaa1d078352bd4baaa13
                                    • Opcode Fuzzy Hash: b1ef72f0f0a80f3f798ade9e3c7b0fa7b8db396eb36a691d66c5d0a47dbd1c4d
                                    • Instruction Fuzzy Hash: B921E0B59002489FDB10DFAAD984AEEBFF5FF48310F14841AE918A7210D378A940CFA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 935 ffd5e8-ffd628 936 ffd62a-ffd62d 935->936 937 ffd630-ffd65b GetModuleHandleW 935->937 936->937 938 ffd65d-ffd663 937->938 939 ffd664-ffd678 937->939 938->939
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00FFD64E
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.3034728055.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_ff0000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 1b00c75ed9eff3808998fb80dea62ab6f0f0c84ad03053c5ad54ae18f99203f8
                                    • Instruction ID: ae5093ef8df7de97190ff4c8c82bcf343338c122cd0a318c66fe0741c85e4879
                                    • Opcode Fuzzy Hash: 1b00c75ed9eff3808998fb80dea62ab6f0f0c84ad03053c5ad54ae18f99203f8
                                    • Instruction Fuzzy Hash: 3611E0B5C003498FDB10DF9AC444ADEFBF5EF88724F10841AD929A7610C379A545CFA5
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.2995729223.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_f9d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1b40c4d51e87100a7a9c0e4e6c87768597d3b63e84558e908ac237204e71ea94
                                    • Instruction ID: d6cca9273bde99339fc4be34f5aa6cc618cc12bb1794188dfb46a2447e98c204
                                    • Opcode Fuzzy Hash: 1b40c4d51e87100a7a9c0e4e6c87768597d3b63e84558e908ac237204e71ea94
                                    • Instruction Fuzzy Hash: BD21D372544204DFEF05DF18D9C0B26BF65FB98324F34C569E9090B256C33AE856EAA2
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.2995729223.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_f9d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a67bb250c4710c734f82a23ca7d3b60224e1e7749b39c1b02d4666f4de68cc2d
                                    • Instruction ID: 575babc9301bf160ed3f18875b1366b83845faa11e9c64f0af035844f26deb6b
                                    • Opcode Fuzzy Hash: a67bb250c4710c734f82a23ca7d3b60224e1e7749b39c1b02d4666f4de68cc2d
                                    • Instruction Fuzzy Hash: 4121F872904204DFEF05DF14D9C0F26BF65FB98328F398569D9090B256C33AD856EBA2
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.3003231373.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_fad000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 351eec9894a26c1af9ee251d33709e5b6587e882d0b240d25ef1767eeeb128da
                                    • Instruction ID: b2427368c5a40da79c5ea1af31fddedd8c4e35e63f0c6d443c2fa02466ff9d70
                                    • Opcode Fuzzy Hash: 351eec9894a26c1af9ee251d33709e5b6587e882d0b240d25ef1767eeeb128da
                                    • Instruction Fuzzy Hash: B921F2B5604204DFCB14DF24D984B26BF65FB89324F20C569D94A4B69AC33AD807EA62
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.3003231373.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_fad000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bfac97522be1cd7614b78f2eeb6df341476410ba1c640c6ba06016a3b55e934a
                                    • Instruction ID: d7eda8e9cfdc51d257d4907754b89648cc9c45d8612f893d1b094c43a87ba076
                                    • Opcode Fuzzy Hash: bfac97522be1cd7614b78f2eeb6df341476410ba1c640c6ba06016a3b55e934a
                                    • Instruction Fuzzy Hash: 152162755093C08FDB12CF24D994715BF71EB46314F28C5EAD8498F6A7C33A980ADB62
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.2995729223.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_f9d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: bc3685b8b8ac8900549d2e851253c86c5d834aa3dcd43aa20ade58f27897227c
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: 8A11DF72804240CFDF06CF14D5C4B16BF62FB94324F34C5A9D9090B656C33AE85ADBA2
                                    Memory Dump Source
                                    • Source File: 00000010.00000002.2995729223.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_16_2_f9d000_WindowsUpdate.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction ID: 7cfa061f23dc91639512168c5b372c72bd419db8516d5bd736e0cec8feb110c1
                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                    • Instruction Fuzzy Hash: AA11AF76904240CFDF16CF14D5C4B16BF71FB98328F28C6A9D9090B256C33AD85ADBA2