Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe

Overview

General Information

Sample name:1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe
Analysis ID:1569885
MD5:2b2449e65ec9cd99f537fb5b936f4dc1
SHA1:59e3d847c809d62b6fc854adca1ca6e781946e60
SHA256:1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Installs a global keyboard hook
Machine Learning detection for sample
Opens the same file many times (likely Sandbox evasion)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["lewisham1122.ddnsking.com:6426:1"], "Assigned name": "4", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-L31JDJ", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
      1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aaf8:$a1: Remcos restarted by watchdog!
        • 0x6b070:$a3: %02i:%02i:%02i:%03i
        1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeREMCOS_RAT_variantsunknownunknown
        • 0x64d94:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64d10:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64d10:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x65210:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x65810:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64e04:$str_b2: Executing file:
        • 0x65c3c:$str_b3: GetDirectListeningPort
        • 0x65600:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65780:$str_b7: \update.vbs
        • 0x64e2c:$str_b9: Downloaded file:
        • 0x64e18:$str_b10: Downloading file:
        • 0x64ebc:$str_b12: Failed to upload file:
        • 0x65c04:$str_b13: StartForward
        • 0x65c24:$str_b14: StopForward
        • 0x656d8:$str_b15: fso.DeleteFile "
        • 0x6566c:$str_b16: On Error Resume Next
        • 0x65708:$str_b17: fso.DeleteFolder "
        • 0x64eac:$str_b18: Uploaded file:
        • 0x64e6c:$str_b19: Unable to delete:
        • 0x656a0:$str_b20: while fso.FileExists("
        • 0x65349:$str_c0: [Firefox StoredLogins not found]
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
          SourceRuleDescriptionAuthorStrings
          00000005.00000002.3712751075.000000000222F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x146f8:$a1: Remcos restarted by watchdog!
                  • 0x14c70:$a3: %02i:%02i:%02i:%03i
                  Click to see the 9 entries
                  SourceRuleDescriptionAuthorStrings
                  5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                      5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                        5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                        • 0x6aaf8:$a1: Remcos restarted by watchdog!
                        • 0x6b070:$a3: %02i:%02i:%02i:%03i
                        5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                        • 0x64d94:$str_a1: C:\Windows\System32\cmd.exe
                        • 0x64d10:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                        • 0x64d10:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                        • 0x65210:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                        • 0x65810:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                        • 0x64e04:$str_b2: Executing file:
                        • 0x65c3c:$str_b3: GetDirectListeningPort
                        • 0x65600:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                        • 0x65780:$str_b7: \update.vbs
                        • 0x64e2c:$str_b9: Downloaded file:
                        • 0x64e18:$str_b10: Downloading file:
                        • 0x64ebc:$str_b12: Failed to upload file:
                        • 0x65c04:$str_b13: StartForward
                        • 0x65c24:$str_b14: StopForward
                        • 0x656d8:$str_b15: fso.DeleteFile "
                        • 0x6566c:$str_b16: On Error Resume Next
                        • 0x65708:$str_b17: fso.DeleteFolder "
                        • 0x64eac:$str_b18: Uploaded file:
                        • 0x64e6c:$str_b19: Unable to delete:
                        • 0x656a0:$str_b20: while fso.FileExists("
                        • 0x65349:$str_c0: [Firefox StoredLogins not found]
                        Click to see the 7 entries

                        Stealing of Sensitive Information

                        barindex
                        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, ProcessId: 7544, TargetFilename: C:\ProgramData\remcos\logs.dat
                        No Suricata rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeAvira: detected
                        Source: lewisham1122.ddnsking.comAvira URL Cloud: Label: malware
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeMalware Configuration Extractor: Remcos {"Host:Port:Password": ["lewisham1122.ddnsking.com:6426:1"], "Assigned name": "4", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-L31JDJ", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeReversingLabs: Detection: 71%
                        Source: Yara matchFile source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLE
                        Source: Yara matchFile source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000005.00000002.3712751075.000000000222F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.9% probability
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,5_2_0043293A
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_de4aa4f6-5

                        Exploits

                        barindex
                        Source: Yara matchFile source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLE
                        Source: Yara matchFile source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe PID: 7544, type: MEMORYSTR

                        Privilege Escalation

                        barindex
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00406764 _wcslen,CoGetObject,5_2_00406764
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,5_2_0040B335
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,5_2_0041B42F
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,5_2_0040B53A
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0044D5E9 FindFirstFileExA,5_2_0044D5E9
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,5_2_004089A9
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00406AC2 FindFirstFileW,FindNextFileW,5_2_00406AC2
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,5_2_00407A8C
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,5_2_00418C69
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,5_2_00408DA7
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,5_2_00406F06

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: lewisham1122.ddnsking.com
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004260F7 recv,5_2_004260F7
                        Source: global trafficDNS traffic detected: DNS query: lewisham1122.ddnsking.com
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp/C

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000005_2_004099E4
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_004159C6
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_004159C6
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_004159C6
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,5_2_00409B10
                        Source: Yara matchFile source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLE
                        Source: Yara matchFile source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe PID: 7544, type: MEMORYSTR

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLE
                        Source: Yara matchFile source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000005.00000002.3712751075.000000000222F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041BB77 SystemParametersInfoW,5_2_0041BB77

                        System Summary

                        barindex
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,5_2_0041ACC1
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,5_2_0041ACED
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,5_2_004158B9
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041D0715_2_0041D071
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004520D25_2_004520D2
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0043D0985_2_0043D098
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004371505_2_00437150
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004361AA5_2_004361AA
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004262545_2_00426254
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004313775_2_00431377
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0043651C5_2_0043651C
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041E5DF5_2_0041E5DF
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0044C7395_2_0044C739
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004367C65_2_004367C6
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004267CB5_2_004267CB
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0043C9DD5_2_0043C9DD
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00432A495_2_00432A49
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00436A8D5_2_00436A8D
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0043CC0C5_2_0043CC0C
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00436D485_2_00436D48
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00434D225_2_00434D22
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00426E735_2_00426E73
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00440E205_2_00440E20
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0043CE3B5_2_0043CE3B
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00412F455_2_00412F45
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00452F005_2_00452F00
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00426FAD5_2_00426FAD
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: String function: 00401F66 appears 50 times
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: String function: 004020E7 appears 40 times
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: String function: 004338A5 appears 42 times
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: String function: 00433FB0 appears 55 times
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@1/1@1/0
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,5_2_00416AB7
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,5_2_0040E219
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,5_2_0041A63F
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,5_2_00419BC4
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-L31JDJ
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: Software\5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: Rmc-L31JDJ5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: Exe5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: Exe5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: Rmc-L31JDJ5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: 0DG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: Inj5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: Inj5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: h5]5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: h5]5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: h5]5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: @CG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: h5]5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: exepath5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: @CG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: exepath5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: h5]5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: licence5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: `=G5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: XCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: dCG5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: Administrator5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: User5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: del5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: del5_2_0040D767
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCommand line argument: del5_2_0040D767
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeReversingLabs: Detection: 71%
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,5_2_0041BCE3
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004567E0 push eax; ret 5_2_004567FE
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00455EAF push ecx; ret 5_2_00455EC2
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00433FF6 push ecx; ret 5_2_00434009
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00406128 ShellExecuteW,URLDownloadToFileW,5_2_00406128
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,5_2_00419BC4
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,5_2_0041BCE3
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0040E54F Sleep,ExitProcess,5_2_0040E54F
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeFile opened: \Device\RasAcd count: 81856Jump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,5_2_004198C2
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeWindow / User API: threadDelayed 1541Jump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeWindow / User API: threadDelayed 2333Jump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeWindow / User API: foregroundWindowGot 1661Jump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeAPI coverage: 9.0 %
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe TID: 7684Thread sleep count: 81 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe TID: 7684Thread sleep time: -40500s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe TID: 7688Thread sleep count: 1541 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe TID: 7688Thread sleep time: -4623000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe TID: 7548Thread sleep count: 273 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe TID: 7548Thread sleep time: -273000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe TID: 7688Thread sleep count: 2333 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe TID: 7688Thread sleep time: -6999000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe TID: 7548Thread sleep count: 96 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe TID: 7548Thread sleep time: -96000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,5_2_0040B335
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,5_2_0041B42F
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,5_2_0040B53A
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0044D5E9 FindFirstFileExA,5_2_0044D5E9
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,5_2_004089A9
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00406AC2 FindFirstFileW,FindNextFileW,5_2_00406AC2
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,5_2_00407A8C
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,5_2_00418C69
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,5_2_00408DA7
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,5_2_00406F06
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeAPI call chain: ExitProcess graph end nodegraph_5-47471
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0043A65D
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,5_2_0041BCE3
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00442554 mov eax, dword ptr fs:[00000030h]5_2_00442554
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0044E92E GetProcessHeap,5_2_0044E92E
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00434168
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0043A65D
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00433B44
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00433CD7 SetUnhandledExceptionFilter,5_2_00433CD7
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe5_2_00410F36
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00418754 mouse_event,5_2_00418754
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerDJ\
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerG<
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr
                        Source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmp, logs.dat.5.drBinary or memory string: [Program Manager]
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00433E0A cpuid 5_2_00433E0A
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: EnumSystemLocalesW,5_2_004470AE
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: GetLocaleInfoW,5_2_004510BA
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_004511E3
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: GetLocaleInfoW,5_2_004512EA
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_004513B7
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: GetLocaleInfoW,5_2_00447597
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: GetLocaleInfoA,5_2_0040E679
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,5_2_00450A7F
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: EnumSystemLocalesW,5_2_00450CF7
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: EnumSystemLocalesW,5_2_00450D42
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: EnumSystemLocalesW,5_2_00450DDD
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_00450E6A
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_00434010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_00434010
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0041A7A2 GetComputerNameExW,GetUserNameW,5_2_0041A7A2
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: 5_2_0044800F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,5_2_0044800F

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLE
                        Source: Yara matchFile source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000005.00000002.3712751075.000000000222F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data5_2_0040B21B
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\5_2_0040B335
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: \key3.db5_2_0040B335

                        Remote Access Functionality

                        barindex
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-L31JDJJump to behavior
                        Source: Yara matchFile source: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, type: SAMPLE
                        Source: Yara matchFile source: 5.2.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.0.1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000005.00000002.3712751075.000000000222F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exeCode function: cmd.exe5_2_00405042
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Deobfuscate/Decode Files or Information
                        1
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services11
                        Archive Collected Data
                        11
                        Ingress Tool Transfer
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts12
                        Command and Scripting Interpreter
                        1
                        Windows Service
                        1
                        Bypass User Account Control
                        2
                        Obfuscated Files or Information
                        211
                        Input Capture
                        1
                        Account Discovery
                        Remote Desktop Protocol211
                        Input Capture
                        2
                        Encrypted Channel
                        Exfiltration Over Bluetooth1
                        Defacement
                        Email AddressesDNS ServerDomain Accounts2
                        Service Execution
                        Logon Script (Windows)1
                        Access Token Manipulation
                        1
                        DLL Side-Loading
                        2
                        Credentials In Files
                        1
                        System Service Discovery
                        SMB/Windows Admin Shares3
                        Clipboard Data
                        1
                        Remote Access Software
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                        Windows Service
                        1
                        Bypass User Account Control
                        NTDS2
                        File and Directory Discovery
                        Distributed Component Object ModelInput Capture1
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                        Process Injection
                        11
                        Virtualization/Sandbox Evasion
                        LSA Secrets22
                        System Information Discovery
                        SSHKeylogging11
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Access Token Manipulation
                        Cached Domain Credentials21
                        Security Software Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                        Process Injection
                        DCSync11
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
                        Process Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                        Application Window Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                        System Owner/User Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe71%ReversingLabsWin32.Backdoor.Remcos
                        1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe100%AviraBDS/Backdoor.Gen
                        1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        lewisham1122.ddnsking.com100%Avira URL Cloudmalware
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        lewisham1122.ddnsking.com
                        0.0.0.0
                        truetrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          lewisham1122.ddnsking.comtrue
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://geoplugin.net/json.gp1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exefalse
                            high
                            http://geoplugin.net/json.gp/C1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exefalse
                              high
                              No contacted IP infos
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1569885
                              Start date and time:2024-12-06 11:10:31 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 6m 58s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:11
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe
                              Detection:MAL
                              Classification:mal100.rans.troj.spyw.expl.evad.winEXE@1/1@1/0
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 26
                              • Number of non-executed functions: 210
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                              • VT rate limit hit for: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe
                              TimeTypeDescription
                              05:11:54API Interceptor2373133x Sleep call for process: 1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe modified
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              lewisham1122.ddnsking.comOrder_DEC2024.wsfGet hashmaliciousRemcosBrowse
                              • 160.25.73.25
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):144
                              Entropy (8bit):3.3517416054053633
                              Encrypted:false
                              SSDEEP:3:rhlKlyKxleUlUCcl5JWRal2Jl+7R0DAlBG45klovDl6v:6lZCUOCU5YcIeeDAlOWAv
                              MD5:0D8E42D300E7626A27A23CF1E73957E8
                              SHA1:A68546E093E3E619E7B892A5A9EB32E3DC776A81
                              SHA-256:23ABE49A5E8149AAE1D9282ECB1A7F1CD9750D51C2B779502405A78586B13DAE
                              SHA-512:AF9178C41F10B3B02F962AE57B7F211B945A9EDB51274605C892987ACFB2D1A5C8A98FB2BA4BAF8EE60C893E8584DA59BAE9D0BA94909FB6E3471356D44FE467
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                              Reputation:low
                              Preview:....[.2.0.2.4./.1.2./.0.6. .0.5.:.1.1.:.2.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.586350600309854
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe
                              File size:493'056 bytes
                              MD5:2b2449e65ec9cd99f537fb5b936f4dc1
                              SHA1:59e3d847c809d62b6fc854adca1ca6e781946e60
                              SHA256:1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00
                              SHA512:029dc4ee0eb0576ac983480cfb54d1eec5461347ab8b08357c64d7fc425af114e89908f4710b4fcd1ec3afc642a6ca6d9eab24744c8189756769cd0baaa30bf6
                              SSDEEP:12288:nuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDSS+DY:a09AfNIEYsunZvZ19Zxs
                              TLSH:89A4BF01B6D2C072D57625300D26E775DEBDBD212835897BB3DA1D67FE30180E63AAB2
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)...H...H...H....(..H....*..H....+..H...0]..H..&....H... ...H... ...H... ...H...0J..H...H...I...!...H...!&..H...!...H..Rich.H.
                              Icon Hash:95694d05214c1b33
                              Entrypoint:0x433b3a
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:TERMINAL_SERVER_AWARE
                              Time Stamp:0x6724916B [Fri Nov 1 08:29:31 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:1
                              File Version Major:5
                              File Version Minor:1
                              Subsystem Version Major:5
                              Subsystem Version Minor:1
                              Import Hash:e77512f955eaf60ccff45e02d69234de
                              Instruction
                              call 00007F4BE04F9213h
                              jmp 00007F4BE04F8B6Fh
                              push ebp
                              mov ebp, esp
                              sub esp, 00000324h
                              push ebx
                              push 00000017h
                              call 00007F4BE051B049h
                              test eax, eax
                              je 00007F4BE04F8CF7h
                              mov ecx, dword ptr [ebp+08h]
                              int 29h
                              push 00000003h
                              call 00007F4BE04F8EB4h
                              mov dword ptr [esp], 000002CCh
                              lea eax, dword ptr [ebp-00000324h]
                              push 00000000h
                              push eax
                              call 00007F4BE04FB1CBh
                              add esp, 0Ch
                              mov dword ptr [ebp-00000274h], eax
                              mov dword ptr [ebp-00000278h], ecx
                              mov dword ptr [ebp-0000027Ch], edx
                              mov dword ptr [ebp-00000280h], ebx
                              mov dword ptr [ebp-00000284h], esi
                              mov dword ptr [ebp-00000288h], edi
                              mov word ptr [ebp-0000025Ch], ss
                              mov word ptr [ebp-00000268h], cs
                              mov word ptr [ebp-0000028Ch], ds
                              mov word ptr [ebp-00000290h], es
                              mov word ptr [ebp-00000294h], fs
                              mov word ptr [ebp-00000298h], gs
                              pushfd
                              pop dword ptr [ebp-00000264h]
                              mov eax, dword ptr [ebp+04h]
                              mov dword ptr [ebp-0000026Ch], eax
                              lea eax, dword ptr [ebp+04h]
                              mov dword ptr [ebp-00000260h], eax
                              mov dword ptr [ebp-00000324h], 00010001h
                              mov eax, dword ptr [eax-04h]
                              push 00000050h
                              mov dword ptr [ebp-00000270h], eax
                              lea eax, dword ptr [ebp-58h]
                              push 00000000h
                              push eax
                              call 00007F4BE04FB141h
                              Programming Language:
                              • [C++] VS2008 SP1 build 30729
                              • [IMP] VS2008 SP1 build 30729
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x6e0200x104.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x760000x4a94.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x7b0000x3b80.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x6c5100x38.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x6c5e80x18.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6c5480x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x570000x4f4.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x55f1d0x5600030cda225e02a0d4dab478a6c7c094860False0.5738610555959303data6.62127843313247IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x570000x18b000x18c009800e1a5325bb58aa054e318c8bb055aFalse0.49812578914141414OpenPGP Secret Key Version 65.758930104385571IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x700000x5d6c0xe0006414e748130e7e668ba2ba172d63448False0.22684151785714285data3.093339598098017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x760000x4a940x4c00ae5b2f6fe4b42f25fc6d8d451ee0b5b0False0.2738486842105263data3.97821778734106IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x7b0000x3b800x3c003a880743591ae3410d0dc26d7322ddd0False0.7569661458333333data6.695050823503309IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x7618c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                              RT_ICON0x765f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                              RT_ICON0x76f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                              RT_ICON0x780240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                              RT_RCDATA0x7a5cc0x487data1.009490940465919
                              RT_GROUP_ICON0x7aa540x3edataEnglishUnited States0.8064516129032258
                              DLLImport
                              KERNEL32.dllExpandEnvironmentStringsA, GetLongPathNameW, CopyFileW, GetLocaleInfoA, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, LoadLibraryA, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, OpenMutexA, lstrcatW, GetCurrentProcessId, GetTempFileNameW, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, SetConsoleOutputCP, FormatMessageA, FindFirstFileA, AllocConsole, lstrcmpW, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, HeapReAlloc, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, GetACP, GetModuleHandleExW, MoveFileExW, LoadLibraryExW, RaiseException, RtlUnwind, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, MultiByteToWideChar, DecodePointer, EncodePointer, TlsFree, TlsSetValue, GetFileSize, TerminateThread, GetLastError, GetModuleHandleA, RemoveDirectoryW, MoveFileW, SetFilePointerEx, CreateDirectoryW, GetLogicalDriveStringsA, DeleteFileW, FindNextFileA, DeleteFileA, SetFileAttributesW, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, GetModuleHandleW, ExitProcess, GetProcAddress, CreateMutexA, GetCurrentProcess, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, FindNextVolumeW, TlsGetValue, TlsAlloc, SwitchToThread, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, WaitForSingleObjectEx, ResetEvent, InitializeCriticalSectionAndSpinCount, SetEndOfFile
                              USER32.dllDefWindowProcA, TranslateMessage, DispatchMessageA, GetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, CallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, GetWindowThreadProcessId, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible, CreateWindowExA, SendInput, EnumDisplaySettingsW, mouse_event, MapVirtualKeyA, TrackPopupMenu, CreatePopupMenu, AppendMenuA, RegisterClassExA, GetCursorPos, SystemParametersInfoW, GetIconInfo, GetSystemMetrics, CloseWindow, DrawIcon
                              GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteDC, DeleteObject, CreateDCA, GetObjectA, SelectObject
                              ADVAPI32.dllLookupPrivilegeValueA, CryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, RegDeleteKeyA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW
                              SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                              ole32.dllCoInitializeEx, CoGetObject, CoUninitialize
                              SHLWAPI.dllStrToIntA, PathFileExistsW, PathFileExistsA
                              WINMM.dllmciSendStringA, mciSendStringW, waveInClose, waveInStop, waveInStart, waveInUnprepareHeader, waveInOpen, waveInAddBuffer, waveInPrepareHeader, PlaySoundW
                              WS2_32.dllsend, WSAStartup, socket, connect, WSAGetLastError, recv, closesocket, inet_ntoa, htons, htonl, getservbyname, ntohs, getservbyport, gethostbyaddr, inet_addr, WSASetLastError, gethostbyname
                              urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                              gdiplus.dllGdipAlloc, GdiplusStartup, GdipGetImageEncoders, GdipLoadImageFromStream, GdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipCloneImage
                              WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 6, 2024 11:11:23.105124950 CET6321753192.168.2.101.1.1.1
                              Dec 6, 2024 11:11:23.469599962 CET53632171.1.1.1192.168.2.10
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Dec 6, 2024 11:11:23.105124950 CET192.168.2.101.1.1.10xea6dStandard query (0)lewisham1122.ddnsking.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Dec 6, 2024 11:11:23.469599962 CET1.1.1.1192.168.2.100xea6dNo error (0)lewisham1122.ddnsking.com0.0.0.0A (IP address)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Target ID:5
                              Start time:05:11:21
                              Start date:06/12/2024
                              Path:C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe"
                              Imagebase:0x400000
                              File size:493'056 bytes
                              MD5 hash:2B2449E65EC9CD99F537FB5B936F4DC1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.3712751075.000000000222F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000005.00000000.1270894481.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.3712404234.00000000005CE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:2.9%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:27.5%
                                Total number of Nodes:1007
                                Total number of Limit Nodes:37
                                execution_graph 46206 43a998 46208 43a9a4 _swprintf ___BuildCatchObject 46206->46208 46207 43a9b2 46224 445354 20 API calls __dosmaperr 46207->46224 46208->46207 46211 43a9dc 46208->46211 46210 43a9b7 46225 43a827 26 API calls _Deallocate 46210->46225 46219 444acc EnterCriticalSection 46211->46219 46214 43a9e7 46220 43aa88 46214->46220 46217 43a9c2 std::_Locinfo::_Locinfo_dtor 46219->46214 46222 43aa96 46220->46222 46221 43a9f2 46226 43aa0f LeaveCriticalSection std::_Lockit::~_Lockit 46221->46226 46222->46221 46227 448416 39 API calls 2 library calls 46222->46227 46224->46210 46225->46217 46226->46217 46227->46222 46228 402bcc 46229 402bd7 46228->46229 46230 402bdf 46228->46230 46246 403315 28 API calls 2 library calls 46229->46246 46232 402beb 46230->46232 46236 4015d3 46230->46236 46233 402bdd 46238 43360d 46236->46238 46239 402be9 46238->46239 46242 43362e std::_Facet_Register 46238->46242 46247 43a88c 46238->46247 46254 442200 7 API calls 2 library calls 46238->46254 46241 433dec std::_Facet_Register 46256 437bd7 RaiseException 46241->46256 46242->46241 46255 437bd7 RaiseException 46242->46255 46245 433e09 46246->46233 46249 446aff __dosmaperr 46247->46249 46248 446b3d 46258 445354 20 API calls __dosmaperr 46248->46258 46249->46248 46251 446b28 RtlAllocateHeap 46249->46251 46257 442200 7 API calls 2 library calls 46249->46257 46251->46249 46252 446b3b 46251->46252 46252->46238 46254->46238 46255->46241 46256->46245 46257->46249 46258->46252 46259 4339be 46260 4339ca ___BuildCatchObject 46259->46260 46291 4336b3 46260->46291 46262 4339d1 46263 433b24 46262->46263 46266 4339fb 46262->46266 46591 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46263->46591 46265 433b2b 46592 4426be 28 API calls _Atexit 46265->46592 46277 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46266->46277 46585 4434d1 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46266->46585 46268 433b31 46593 442670 28 API calls _Atexit 46268->46593 46271 433a14 46273 433a1a 46271->46273 46586 443475 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46271->46586 46272 433b39 46275 433a9b 46302 433c5e 46275->46302 46277->46275 46587 43edf4 38 API calls 3 library calls 46277->46587 46285 433abd 46285->46265 46286 433ac1 46285->46286 46287 433aca 46286->46287 46589 442661 28 API calls _Atexit 46286->46589 46590 433842 13 API calls 2 library calls 46287->46590 46290 433ad2 46290->46273 46292 4336bc 46291->46292 46594 433e0a IsProcessorFeaturePresent 46292->46594 46294 4336c8 46595 4379ee 10 API calls 3 library calls 46294->46595 46296 4336cd 46301 4336d1 46296->46301 46596 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46296->46596 46298 4336da 46299 4336e8 46298->46299 46597 437a17 8 API calls 3 library calls 46298->46597 46299->46262 46301->46262 46598 436050 46302->46598 46305 433aa1 46306 443422 46305->46306 46600 44ddc9 46306->46600 46308 44342b 46309 433aaa 46308->46309 46604 44e0d3 38 API calls 46308->46604 46311 40d767 46309->46311 46606 41bce3 LoadLibraryA GetProcAddress 46311->46606 46313 40d783 GetModuleFileNameW 46611 40e168 46313->46611 46315 40d79f 46626 401fbd 46315->46626 46318 401fbd 28 API calls 46319 40d7bd 46318->46319 46630 41afc3 46319->46630 46323 40d7cf 46655 401d8c 46323->46655 46325 40d7d8 46326 40d835 46325->46326 46327 40d7eb 46325->46327 46661 401d64 46326->46661 46916 40e986 111 API calls 46327->46916 46330 40d845 46333 401d64 28 API calls 46330->46333 46331 40d7fd 46332 401d64 28 API calls 46331->46332 46336 40d809 46332->46336 46334 40d864 46333->46334 46666 404cbf 46334->46666 46917 40e937 68 API calls 46336->46917 46337 40d873 46670 405ce6 46337->46670 46340 40d87f 46673 401eef 46340->46673 46341 40d824 46918 40e155 68 API calls 46341->46918 46344 40d88b 46677 401eea 46344->46677 46346 40d894 46348 401eea 26 API calls 46346->46348 46347 401eea 26 API calls 46349 40dc9f 46347->46349 46350 40d89d 46348->46350 46588 433c94 GetModuleHandleW 46349->46588 46351 401d64 28 API calls 46350->46351 46352 40d8a6 46351->46352 46681 401ebd 46352->46681 46354 40d8b1 46355 401d64 28 API calls 46354->46355 46356 40d8ca 46355->46356 46357 401d64 28 API calls 46356->46357 46359 40d8e5 46357->46359 46358 40d946 46361 401d64 28 API calls 46358->46361 46376 40e134 46358->46376 46359->46358 46919 4085b4 46359->46919 46366 40d95d 46361->46366 46362 40d912 46363 401eef 26 API calls 46362->46363 46364 40d91e 46363->46364 46367 401eea 26 API calls 46364->46367 46365 40d9a4 46685 40bed7 46365->46685 46366->46365 46371 4124b7 3 API calls 46366->46371 46368 40d927 46367->46368 46923 4124b7 RegOpenKeyExA 46368->46923 46370 40d9aa 46372 40d82d 46370->46372 46688 41a463 46370->46688 46377 40d988 46371->46377 46372->46347 46375 40d9c5 46378 40da18 46375->46378 46705 40697b 46375->46705 46999 412902 30 API calls 46376->46999 46377->46365 46926 412902 30 API calls 46377->46926 46380 401d64 28 API calls 46378->46380 46383 40da21 46380->46383 46392 40da32 46383->46392 46393 40da2d 46383->46393 46385 40e14a 47000 4112b5 64 API calls ___scrt_fastfail 46385->47000 46386 40d9e4 46927 40699d 30 API calls 46386->46927 46387 40d9ee 46389 401d64 28 API calls 46387->46389 46400 40d9f7 46389->46400 46395 401d64 28 API calls 46392->46395 46930 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46393->46930 46394 40d9e9 46928 4064d0 97 API calls 46394->46928 46398 40da3b 46395->46398 46709 41ae08 46398->46709 46400->46378 46403 40da13 46400->46403 46401 40da46 46713 401e18 46401->46713 46929 4064d0 97 API calls 46403->46929 46404 40da51 46717 401e13 46404->46717 46407 40da5a 46408 401d64 28 API calls 46407->46408 46409 40da63 46408->46409 46410 401d64 28 API calls 46409->46410 46411 40da7d 46410->46411 46412 401d64 28 API calls 46411->46412 46413 40da97 46412->46413 46414 401d64 28 API calls 46413->46414 46416 40dab0 46414->46416 46415 40db1d 46417 40db2c 46415->46417 46424 40dcaa ___scrt_fastfail 46415->46424 46416->46415 46418 401d64 28 API calls 46416->46418 46419 40db35 46417->46419 46447 40dbb1 ___scrt_fastfail 46417->46447 46422 40dac5 _wcslen 46418->46422 46420 401d64 28 API calls 46419->46420 46421 40db3e 46420->46421 46423 401d64 28 API calls 46421->46423 46422->46415 46425 401d64 28 API calls 46422->46425 46426 40db50 46423->46426 46990 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 46424->46990 46427 40dae0 46425->46427 46429 401d64 28 API calls 46426->46429 46430 401d64 28 API calls 46427->46430 46431 40db62 46429->46431 46432 40daf5 46430->46432 46435 401d64 28 API calls 46431->46435 46931 40c89e 46432->46931 46433 40dcef 46434 401d64 28 API calls 46433->46434 46436 40dd16 46434->46436 46438 40db8b 46435->46438 46731 401f66 46436->46731 46441 401d64 28 API calls 46438->46441 46440 401e18 26 API calls 46443 40db14 46440->46443 46444 40db9c 46441->46444 46446 401e13 26 API calls 46443->46446 46988 40bc67 46 API calls _wcslen 46444->46988 46445 40dd25 46735 4126d2 RegCreateKeyA 46445->46735 46446->46415 46721 4128a2 46447->46721 46451 40dc45 ctype 46456 401d64 28 API calls 46451->46456 46452 40dbac 46452->46447 46454 401d64 28 API calls 46455 40dd47 46454->46455 46741 43a5e7 46455->46741 46457 40dc5c 46456->46457 46457->46433 46461 40dc70 46457->46461 46460 40dd5e 46991 41beb0 87 API calls ___scrt_fastfail 46460->46991 46463 401d64 28 API calls 46461->46463 46462 40dd81 46467 401f66 28 API calls 46462->46467 46465 40dc7e 46463->46465 46468 41ae08 28 API calls 46465->46468 46466 40dd65 CreateThread 46466->46462 47473 41c96f 10 API calls 46466->47473 46469 40dd96 46467->46469 46470 40dc87 46468->46470 46471 401f66 28 API calls 46469->46471 46989 40e219 112 API calls 46470->46989 46473 40dda5 46471->46473 46745 41a686 46473->46745 46474 40dc8c 46474->46433 46476 40dc93 46474->46476 46476->46372 46478 401d64 28 API calls 46479 40ddb6 46478->46479 46480 401d64 28 API calls 46479->46480 46481 40ddcb 46480->46481 46482 401d64 28 API calls 46481->46482 46483 40ddeb 46482->46483 46484 43a5e7 42 API calls 46483->46484 46485 40ddf8 46484->46485 46486 401d64 28 API calls 46485->46486 46487 40de03 46486->46487 46488 401d64 28 API calls 46487->46488 46489 40de14 46488->46489 46490 401d64 28 API calls 46489->46490 46491 40de29 46490->46491 46492 401d64 28 API calls 46491->46492 46493 40de3a 46492->46493 46494 40de41 StrToIntA 46493->46494 46769 409517 46494->46769 46497 401d64 28 API calls 46498 40de5c 46497->46498 46499 40dea1 46498->46499 46500 40de68 46498->46500 46503 401d64 28 API calls 46499->46503 46992 43360d 22 API calls 3 library calls 46500->46992 46502 40de71 46504 401d64 28 API calls 46502->46504 46505 40deb1 46503->46505 46506 40de84 46504->46506 46507 40def9 46505->46507 46508 40debd 46505->46508 46509 40de8b CreateThread 46506->46509 46511 401d64 28 API calls 46507->46511 46993 43360d 22 API calls 3 library calls 46508->46993 46509->46499 47477 419128 109 API calls __EH_prolog 46509->47477 46513 40df02 46511->46513 46512 40dec6 46514 401d64 28 API calls 46512->46514 46516 40df6c 46513->46516 46517 40df0e 46513->46517 46515 40ded8 46514->46515 46518 40dedf CreateThread 46515->46518 46519 401d64 28 API calls 46516->46519 46520 401d64 28 API calls 46517->46520 46518->46507 47476 419128 109 API calls __EH_prolog 46518->47476 46521 40df75 46519->46521 46522 40df1e 46520->46522 46523 40df81 46521->46523 46524 40dfba 46521->46524 46525 401d64 28 API calls 46522->46525 46526 401d64 28 API calls 46523->46526 46794 41a7a2 GetComputerNameExW GetUserNameW 46524->46794 46527 40df33 46525->46527 46529 40df8a 46526->46529 46994 40c854 32 API calls 46527->46994 46535 401d64 28 API calls 46529->46535 46531 401e18 26 API calls 46532 40dfce 46531->46532 46534 401e13 26 API calls 46532->46534 46537 40dfd7 46534->46537 46538 40df9f 46535->46538 46536 40df46 46539 401e18 26 API calls 46536->46539 46540 40dfe0 SetProcessDEPPolicy 46537->46540 46541 40dfe3 CreateThread 46537->46541 46548 43a5e7 42 API calls 46538->46548 46542 40df52 46539->46542 46540->46541 46543 40e004 46541->46543 46544 40dff8 CreateThread 46541->46544 47445 40e54f 46541->47445 46545 401e13 26 API calls 46542->46545 46546 40e019 46543->46546 46547 40e00d CreateThread 46543->46547 46544->46543 47472 410f36 138 API calls 46544->47472 46549 40df5b CreateThread 46545->46549 46551 40e073 46546->46551 46553 401f66 28 API calls 46546->46553 46547->46546 47474 411524 38 API calls ___scrt_fastfail 46547->47474 46550 40dfac 46548->46550 46549->46516 47475 40196b 49 API calls 46549->47475 46995 40b95c 7 API calls 46550->46995 46805 41246e RegOpenKeyExA 46551->46805 46554 40e046 46553->46554 46996 404c9e 28 API calls 46554->46996 46557 40e053 46559 401f66 28 API calls 46557->46559 46561 40e062 46559->46561 46560 40e12a 46817 40cbac 46560->46817 46564 41a686 79 API calls 46561->46564 46563 41ae08 28 API calls 46566 40e0a4 46563->46566 46567 40e067 46564->46567 46808 412584 RegOpenKeyExW 46566->46808 46569 401eea 26 API calls 46567->46569 46569->46551 46572 401e13 26 API calls 46575 40e0c5 46572->46575 46573 40e0ed DeleteFileW 46574 40e0f4 46573->46574 46573->46575 46577 41ae08 28 API calls 46574->46577 46575->46573 46575->46574 46576 40e0db Sleep 46575->46576 46997 401e07 46576->46997 46579 40e104 46577->46579 46813 41297a RegOpenKeyExW 46579->46813 46581 40e117 46582 401e13 26 API calls 46581->46582 46583 40e121 46582->46583 46584 401e13 26 API calls 46583->46584 46584->46560 46585->46271 46586->46277 46587->46275 46588->46285 46589->46287 46590->46290 46591->46265 46592->46268 46593->46272 46594->46294 46595->46296 46596->46298 46597->46301 46599 433c71 GetStartupInfoW 46598->46599 46599->46305 46601 44dddb 46600->46601 46602 44ddd2 46600->46602 46601->46308 46605 44dcc8 51 API calls 5 library calls 46602->46605 46604->46308 46605->46601 46607 41bd22 LoadLibraryA GetProcAddress 46606->46607 46608 41bd12 GetModuleHandleA GetProcAddress 46606->46608 46609 41bd4b 32 API calls 46607->46609 46610 41bd3b LoadLibraryA GetProcAddress 46607->46610 46608->46607 46609->46313 46610->46609 47001 41a63f FindResourceA 46611->47001 46614 43a88c _Yarn 21 API calls 46615 40e192 _Yarn 46614->46615 47004 401f86 46615->47004 46618 401eef 26 API calls 46619 40e1b8 46618->46619 46620 401eea 26 API calls 46619->46620 46621 40e1c1 46620->46621 46622 43a88c _Yarn 21 API calls 46621->46622 46623 40e1d2 _Yarn 46622->46623 47008 406052 46623->47008 46625 40e205 46625->46315 46627 401fcc 46626->46627 47016 402501 46627->47016 46629 401fea 46629->46318 46649 41afd6 46630->46649 46631 401eea 26 API calls 46632 41b078 46631->46632 46634 401eea 26 API calls 46632->46634 46633 41b048 47029 403b60 28 API calls 46633->47029 46635 41b080 46634->46635 46638 401eea 26 API calls 46635->46638 46640 40d7c6 46638->46640 46639 41b054 46641 401eef 26 API calls 46639->46641 46651 40e8bd 46640->46651 46643 41b05d 46641->46643 46642 401eef 26 API calls 46642->46649 46644 401eea 26 API calls 46643->46644 46646 41b065 46644->46646 46645 401eea 26 API calls 46645->46649 46647 41bfa9 28 API calls 46646->46647 46650 41b046 46647->46650 46649->46633 46649->46642 46649->46645 46649->46650 47021 403b60 28 API calls 46649->47021 47022 41bfa9 46649->47022 46650->46631 46652 40e8ca 46651->46652 46654 40e8da 46652->46654 47057 40200a 26 API calls 46652->47057 46654->46323 46656 40200a 46655->46656 46660 40203a 46656->46660 47058 402654 26 API calls 46656->47058 46658 40202b 47059 4026ba 26 API calls _Deallocate 46658->47059 46660->46325 46662 401d6c 46661->46662 46663 401d74 46662->46663 47060 401fff 28 API calls 46662->47060 46663->46330 46667 404ccb 46666->46667 47061 402e78 46667->47061 46669 404cee 46669->46337 47070 404bc4 46670->47070 46672 405cf4 46672->46340 46674 401efe 46673->46674 46675 401f0a 46674->46675 47079 4021b9 26 API calls 46674->47079 46675->46344 46678 4021b9 46677->46678 46679 4021e8 46678->46679 47080 40262e 26 API calls _Deallocate 46678->47080 46679->46346 46683 401ec9 46681->46683 46682 401ee4 46682->46354 46683->46682 46684 402325 28 API calls 46683->46684 46684->46682 47081 401e8f 46685->47081 46687 40bee1 CreateMutexA GetLastError 46687->46370 47083 41b15b 46688->47083 46690 41a471 47087 412513 RegOpenKeyExA 46690->47087 46693 401eef 26 API calls 46694 41a49f 46693->46694 46695 401eea 26 API calls 46694->46695 46696 41a4a7 46695->46696 46697 41a4fa 46696->46697 46698 412513 31 API calls 46696->46698 46697->46375 46699 41a4cd 46698->46699 46700 41a4d8 StrToIntA 46699->46700 46701 41a4ef 46700->46701 46702 41a4e6 46700->46702 46704 401eea 26 API calls 46701->46704 47092 41c102 28 API calls 46702->47092 46704->46697 46706 40698f 46705->46706 46707 4124b7 3 API calls 46706->46707 46708 406996 46707->46708 46708->46386 46708->46387 46710 41ae1c 46709->46710 47093 40b027 46710->47093 46712 41ae24 46712->46401 46714 401e27 46713->46714 46716 401e33 46714->46716 47102 402121 26 API calls 46714->47102 46716->46404 46719 402121 46717->46719 46718 402150 46718->46407 46719->46718 47103 402718 26 API calls _Deallocate 46719->47103 46722 4128c0 46721->46722 46723 406052 28 API calls 46722->46723 46724 4128d5 46723->46724 46725 401fbd 28 API calls 46724->46725 46726 4128e5 46725->46726 46727 4126d2 29 API calls 46726->46727 46728 4128ef 46727->46728 46729 401eea 26 API calls 46728->46729 46730 4128fc 46729->46730 46730->46451 46732 401f6e 46731->46732 47104 402301 46732->47104 46736 412722 46735->46736 46738 4126eb 46735->46738 46737 401eea 26 API calls 46736->46737 46739 40dd3b 46737->46739 46740 4126fd RegSetValueExA RegCloseKey 46738->46740 46739->46454 46740->46736 46742 43a600 _swprintf 46741->46742 47108 43993e 46742->47108 46746 41a737 46745->46746 46747 41a69c GetLocalTime 46745->46747 46749 401eea 26 API calls 46746->46749 46748 404cbf 28 API calls 46747->46748 46750 41a6de 46748->46750 46751 41a73f 46749->46751 46752 405ce6 28 API calls 46750->46752 46753 401eea 26 API calls 46751->46753 46754 41a6ea 46752->46754 46755 40ddaa 46753->46755 47142 4027cb 46754->47142 46755->46478 46757 41a6f6 46758 405ce6 28 API calls 46757->46758 46759 41a702 46758->46759 47145 406478 76 API calls 46759->47145 46761 41a710 46762 401eea 26 API calls 46761->46762 46763 41a71c 46762->46763 46764 401eea 26 API calls 46763->46764 46765 41a725 46764->46765 46766 401eea 26 API calls 46765->46766 46767 41a72e 46766->46767 46768 401eea 26 API calls 46767->46768 46768->46746 46770 409536 _wcslen 46769->46770 46771 409541 46770->46771 46772 409558 46770->46772 46774 40c89e 32 API calls 46771->46774 46773 40c89e 32 API calls 46772->46773 46776 409560 46773->46776 46775 409549 46774->46775 46777 401e18 26 API calls 46775->46777 46778 401e18 26 API calls 46776->46778 46793 409553 46777->46793 46779 40956e 46778->46779 46780 401e13 26 API calls 46779->46780 46782 409576 46780->46782 46781 401e13 26 API calls 46783 4095ad 46781->46783 47165 40856b 28 API calls 46782->47165 47150 409837 46783->47150 46786 409588 47166 4028cf 46786->47166 46789 409593 46790 401e18 26 API calls 46789->46790 46791 40959d 46790->46791 46792 401e13 26 API calls 46791->46792 46792->46793 46793->46781 47331 403b40 46794->47331 46798 41a7fd 46799 4028cf 28 API calls 46798->46799 46800 41a807 46799->46800 46801 401e13 26 API calls 46800->46801 46802 41a810 46801->46802 46803 401e13 26 API calls 46802->46803 46804 40dfc3 46803->46804 46804->46531 46806 41248f RegQueryValueExA RegCloseKey 46805->46806 46807 40e08b 46805->46807 46806->46807 46807->46560 46807->46563 46809 4125b0 RegQueryValueExW RegCloseKey 46808->46809 46810 4125dd 46808->46810 46809->46810 46811 403b40 28 API calls 46810->46811 46812 40e0ba 46811->46812 46812->46572 46814 412992 RegDeleteValueW 46813->46814 46815 4129a6 46813->46815 46814->46815 46816 4129a2 46814->46816 46815->46581 46816->46581 46818 40cbc5 46817->46818 46819 41246e 3 API calls 46818->46819 46820 40cbcc 46819->46820 46821 40cbeb 46820->46821 47359 401602 46820->47359 46825 413fd4 46821->46825 46823 40cbd9 47362 4127d5 RegCreateKeyA 46823->47362 46826 413feb 46825->46826 47379 41aa73 46826->47379 46828 413ff6 46829 401d64 28 API calls 46828->46829 46830 41400f 46829->46830 46831 43a5e7 42 API calls 46830->46831 46832 41401c 46831->46832 46833 414021 Sleep 46832->46833 46834 41402e 46832->46834 46833->46834 46835 401f66 28 API calls 46834->46835 46836 41403d 46835->46836 46837 401d64 28 API calls 46836->46837 46838 41404b 46837->46838 46839 401fbd 28 API calls 46838->46839 46840 414053 46839->46840 46841 41afc3 28 API calls 46840->46841 46842 41405b 46841->46842 47383 404262 WSAStartup 46842->47383 46844 414065 46845 401d64 28 API calls 46844->46845 46846 41406e 46845->46846 46847 401d64 28 API calls 46846->46847 46878 4140ed 46846->46878 46848 414087 46847->46848 46850 401d64 28 API calls 46848->46850 46849 401fbd 28 API calls 46849->46878 46851 414098 46850->46851 46853 401d64 28 API calls 46851->46853 46852 41afc3 28 API calls 46852->46878 46854 4140a9 46853->46854 46856 401d64 28 API calls 46854->46856 46855 4085b4 28 API calls 46855->46878 46857 4140ba 46856->46857 46858 401d64 28 API calls 46857->46858 46860 4140cb 46858->46860 46859 401eef 26 API calls 46859->46878 46862 401d64 28 API calls 46860->46862 46861 401eea 26 API calls 46861->46878 46863 4140dd 46862->46863 47412 404101 87 API calls 46863->47412 46865 404cbf 28 API calls 46865->46878 46866 405ce6 28 API calls 46866->46878 46867 4027cb 28 API calls 46867->46878 46868 41a686 79 API calls 46868->46878 46869 401d64 28 API calls 46869->46878 46871 414244 WSAGetLastError 47389 41bc76 46871->47389 46874 4142ca 46874->46878 46880 401d64 28 API calls 46874->46880 46882 404cbf 28 API calls 46874->46882 46886 401f66 28 API calls 46874->46886 46887 41a686 79 API calls 46874->46887 46890 4082dc 28 API calls 46874->46890 46892 401fbd 28 API calls 46874->46892 46894 412513 31 API calls 46874->46894 46895 403b40 28 API calls 46874->46895 46898 41aec8 28 API calls 46874->46898 46899 41ad46 28 API calls 46874->46899 46900 401d64 28 API calls 46874->46900 46907 4027cb 28 API calls 46874->46907 46908 405ce6 28 API calls 46874->46908 46909 40275c 28 API calls 46874->46909 46911 401eea 26 API calls 46874->46911 46914 414b22 CreateThread 46874->46914 46915 401e13 26 API calls 46874->46915 47415 404915 82 API calls 46874->47415 47416 40428c 96 API calls 46874->47416 47417 41a96d GlobalMemoryStatusEx 46874->47417 47418 413683 50 API calls 46874->47418 47419 440c51 26 API calls 46874->47419 47420 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 46874->47420 47421 40cbf1 6 API calls 46874->47421 47422 41adee 28 API calls 46874->47422 47424 41aca0 GetLastInputInfo GetTickCount 46874->47424 47425 41ac52 30 API calls ___scrt_fastfail 46874->47425 47426 40e679 29 API calls 46874->47426 47427 4027ec 28 API calls 46874->47427 47428 404468 60 API calls _Yarn 46874->47428 47429 4045d5 112 API calls _Yarn 46874->47429 47430 40a767 84 API calls 46874->47430 46876 401f66 28 API calls 46876->46878 46878->46849 46878->46852 46878->46855 46878->46859 46878->46861 46878->46865 46878->46866 46878->46867 46878->46868 46878->46869 46878->46871 46878->46874 46878->46876 46883 401d8c 26 API calls 46878->46883 46884 43a5e7 42 API calls 46878->46884 47384 413f9a 46878->47384 47399 4047eb WaitForSingleObject 46878->47399 47413 404c9e 28 API calls 46878->47413 47414 4041f1 socket CreateEventW WSAStartup 46878->47414 46880->46874 46882->46874 46883->46878 46885 414b80 Sleep 46884->46885 46885->46878 46886->46874 46887->46874 46890->46874 46892->46874 46894->46874 46895->46874 46898->46874 46899->46874 46901 4144ed GetTickCount 46900->46901 47423 41ad46 28 API calls 46901->47423 46907->46874 46908->46874 46909->46874 46911->46874 46914->46874 47438 419e89 103 API calls 46914->47438 46915->46874 46916->46331 46917->46341 46920 4085c0 46919->46920 46921 402e78 28 API calls 46920->46921 46922 4085e4 46921->46922 46922->46362 46924 4124e1 RegQueryValueExA RegCloseKey 46923->46924 46925 41250b 46923->46925 46924->46925 46925->46358 46926->46365 46927->46394 46928->46387 46929->46378 46930->46392 46932 40c8ba 46931->46932 46933 40c8da 46932->46933 46934 40c90f 46932->46934 46936 40c8d0 46932->46936 47439 41a74b 29 API calls 46933->47439 46937 41b15b 2 API calls 46934->46937 46935 40ca03 GetLongPathNameW 46939 403b40 28 API calls 46935->46939 46936->46935 46940 40c914 46937->46940 46943 40ca18 46939->46943 46944 40c918 46940->46944 46945 40c96a 46940->46945 46941 40c8e3 46942 401e18 26 API calls 46941->46942 46946 40c8ed 46942->46946 46947 403b40 28 API calls 46943->46947 46949 403b40 28 API calls 46944->46949 46948 403b40 28 API calls 46945->46948 46953 401e13 26 API calls 46946->46953 46950 40ca27 46947->46950 46951 40c978 46948->46951 46952 40c926 46949->46952 47442 40cc37 28 API calls 46950->47442 46957 403b40 28 API calls 46951->46957 46958 403b40 28 API calls 46952->46958 46953->46936 46955 40ca3a 47443 402860 28 API calls 46955->47443 46961 40c98e 46957->46961 46959 40c93c 46958->46959 47440 402860 28 API calls 46959->47440 46960 40ca45 47444 402860 28 API calls 46960->47444 47441 402860 28 API calls 46961->47441 46965 40c999 46969 401e18 26 API calls 46965->46969 46966 40c947 46970 401e18 26 API calls 46966->46970 46967 40ca4f 46968 401e13 26 API calls 46967->46968 46971 40ca59 46968->46971 46972 40c9a4 46969->46972 46973 40c952 46970->46973 46974 401e13 26 API calls 46971->46974 46975 401e13 26 API calls 46972->46975 46976 401e13 26 API calls 46973->46976 46977 40ca62 46974->46977 46978 40c9ad 46975->46978 46979 40c95b 46976->46979 46980 401e13 26 API calls 46977->46980 46981 401e13 26 API calls 46978->46981 46982 401e13 26 API calls 46979->46982 46983 40ca6b 46980->46983 46981->46946 46982->46946 46984 401e13 26 API calls 46983->46984 46985 40ca74 46984->46985 46986 401e13 26 API calls 46985->46986 46987 40ca7d 46986->46987 46987->46440 46988->46452 46989->46474 46990->46433 46991->46466 46992->46502 46993->46512 46994->46536 46995->46524 46996->46557 46998 401e0c 46997->46998 46999->46385 47002 40e183 47001->47002 47003 41a65c LoadResource LockResource SizeofResource 47001->47003 47002->46614 47003->47002 47005 401f8e 47004->47005 47011 402325 47005->47011 47007 401fa4 47007->46618 47009 401f86 28 API calls 47008->47009 47010 406066 47009->47010 47010->46625 47012 40232f 47011->47012 47014 40233a 47012->47014 47015 40294a 28 API calls 47012->47015 47014->47007 47015->47014 47017 40250d 47016->47017 47019 40252b 47017->47019 47020 40261a 28 API calls 47017->47020 47019->46629 47020->47019 47021->46649 47023 41bfae 47022->47023 47024 41bfd2 47023->47024 47025 41bfcb 47023->47025 47030 41c552 47024->47030 47049 41bfe3 28 API calls 47025->47049 47027 41bfd0 47027->46649 47029->46639 47031 41c55c __EH_prolog 47030->47031 47032 41c673 47031->47032 47033 41c595 47031->47033 47056 402649 28 API calls std::_Xinvalid_argument 47032->47056 47050 4026a7 28 API calls 47033->47050 47037 41c5a9 47051 41c536 28 API calls 47037->47051 47039 41c5dc 47040 41c603 47039->47040 47041 41c5f7 47039->47041 47053 41c7cf 26 API calls 47040->47053 47052 41c7b2 26 API calls 47041->47052 47044 41c601 47055 41c75a 26 API calls 47044->47055 47045 41c60f 47054 41c7cf 26 API calls 47045->47054 47048 41c63e 47048->47027 47049->47027 47050->47037 47051->47039 47052->47044 47053->47045 47054->47044 47055->47048 47057->46654 47058->46658 47059->46660 47062 402e85 47061->47062 47063 402e98 47062->47063 47065 402ea9 47062->47065 47066 402eae 47062->47066 47068 403445 28 API calls 47063->47068 47065->46669 47066->47065 47069 40225b 26 API calls 47066->47069 47068->47065 47069->47065 47071 404bd0 47070->47071 47074 40245c 47071->47074 47073 404be4 47073->46672 47075 402469 47074->47075 47076 402478 47075->47076 47078 402ad3 28 API calls 47075->47078 47076->47073 47078->47076 47079->46675 47080->46679 47082 401e94 47081->47082 47084 41b183 47083->47084 47085 41b168 GetCurrentProcess IsWow64Process 47083->47085 47084->46690 47085->47084 47086 41b17f 47085->47086 47086->46690 47088 412541 RegQueryValueExA RegCloseKey 47087->47088 47089 412569 47087->47089 47088->47089 47090 401f66 28 API calls 47089->47090 47091 41257e 47090->47091 47091->46693 47092->46701 47094 40b02f 47093->47094 47097 40b04b 47094->47097 47096 40b045 47096->46712 47098 40b055 47097->47098 47100 40b060 47098->47100 47101 40b138 28 API calls 47098->47101 47100->47096 47101->47100 47102->46716 47103->46718 47105 40230d 47104->47105 47106 402325 28 API calls 47105->47106 47107 401f80 47106->47107 47107->46445 47126 43a545 47108->47126 47110 43998b 47135 4392de 38 API calls 3 library calls 47110->47135 47111 439950 47111->47110 47112 439965 47111->47112 47125 40dd54 47111->47125 47133 445354 20 API calls __dosmaperr 47112->47133 47115 43996a 47134 43a827 26 API calls _Deallocate 47115->47134 47118 439997 47119 4399c6 47118->47119 47136 43a58a 42 API calls __Toupper 47118->47136 47120 439a32 47119->47120 47137 43a4f1 26 API calls 2 library calls 47119->47137 47138 43a4f1 26 API calls 2 library calls 47120->47138 47123 439af9 _swprintf 47123->47125 47139 445354 20 API calls __dosmaperr 47123->47139 47125->46460 47125->46462 47127 43a54a 47126->47127 47128 43a55d 47126->47128 47140 445354 20 API calls __dosmaperr 47127->47140 47128->47111 47130 43a54f 47141 43a827 26 API calls _Deallocate 47130->47141 47132 43a55a 47132->47111 47133->47115 47134->47125 47135->47118 47136->47118 47137->47120 47138->47123 47139->47125 47140->47130 47141->47132 47146 401e9b 47142->47146 47144 4027d9 47144->46757 47145->46761 47147 401ea7 47146->47147 47148 40245c 28 API calls 47147->47148 47149 401eb9 47148->47149 47149->47144 47151 409855 47150->47151 47152 4124b7 3 API calls 47151->47152 47153 40985c 47152->47153 47154 409870 47153->47154 47155 40988a 47153->47155 47156 4095cf 47154->47156 47157 409875 47154->47157 47169 4082dc 47155->47169 47156->46497 47159 4082dc 28 API calls 47157->47159 47162 409883 47159->47162 47195 409959 29 API calls 47162->47195 47164 409888 47164->47156 47165->46786 47322 402d8b 47166->47322 47168 4028dd 47168->46789 47170 4082eb 47169->47170 47196 408431 47170->47196 47172 408309 47173 4098a5 47172->47173 47201 40affa 47173->47201 47176 4098f6 47179 401f66 28 API calls 47176->47179 47177 4098ce 47178 401f66 28 API calls 47177->47178 47180 4098d8 47178->47180 47181 409901 47179->47181 47183 41ae08 28 API calls 47180->47183 47182 401f66 28 API calls 47181->47182 47184 409910 47182->47184 47185 4098e6 47183->47185 47186 41a686 79 API calls 47184->47186 47205 40a876 31 API calls _Yarn 47185->47205 47188 409915 CreateThread 47186->47188 47190 409930 CreateThread 47188->47190 47191 40993c CreateThread 47188->47191 47217 4099a9 47188->47217 47189 4098ed 47192 401eea 26 API calls 47189->47192 47190->47191 47214 409993 47190->47214 47193 401e13 26 API calls 47191->47193 47211 4099b5 47191->47211 47192->47176 47194 409950 47193->47194 47194->47156 47195->47164 47321 40999f 135 API calls 47195->47321 47197 40843d 47196->47197 47199 40845b 47197->47199 47200 402f0d 28 API calls 47197->47200 47199->47172 47200->47199 47203 40b006 47201->47203 47202 4098c3 47202->47176 47202->47177 47203->47202 47206 403b9e 47203->47206 47205->47189 47207 403ba8 47206->47207 47209 403bb3 47207->47209 47210 403cfd 28 API calls 47207->47210 47209->47202 47210->47209 47220 40a3f4 47211->47220 47258 4099e4 47214->47258 47276 409e48 47217->47276 47229 40a402 47220->47229 47221 4099be 47222 40a45c Sleep GetForegroundWindow GetWindowTextLengthW 47224 40b027 28 API calls 47222->47224 47224->47229 47227 41aca0 GetLastInputInfo GetTickCount 47247 40a4bc 47227->47247 47228 40a4a2 GetWindowTextW 47228->47229 47229->47221 47229->47222 47229->47228 47229->47247 47249 433519 5 API calls __Init_thread_wait 47229->47249 47250 4338a5 29 API calls __onexit 47229->47250 47251 4334cf EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 47229->47251 47231 401e13 26 API calls 47231->47247 47232 40a5ff 47234 401e13 26 API calls 47232->47234 47233 40affa 28 API calls 47233->47247 47234->47221 47235 40a569 Sleep 47235->47247 47238 401f66 28 API calls 47238->47247 47241 4082dc 28 API calls 47241->47247 47243 4028cf 28 API calls 47243->47247 47244 405ce6 28 API calls 47244->47247 47245 41ae08 28 API calls 47245->47247 47246 409d58 27 API calls 47246->47247 47247->47227 47247->47229 47247->47231 47247->47232 47247->47233 47247->47235 47247->47238 47247->47241 47247->47243 47247->47244 47247->47245 47247->47246 47248 401eea 26 API calls 47247->47248 47252 4082a8 28 API calls 47247->47252 47253 40a876 31 API calls _Yarn 47247->47253 47254 40b0dd 28 API calls 47247->47254 47255 40ae58 44 API calls 2 library calls 47247->47255 47256 440c51 26 API calls 47247->47256 47257 404c9e 28 API calls 47247->47257 47248->47247 47249->47229 47250->47229 47251->47229 47252->47247 47253->47247 47254->47247 47255->47247 47256->47247 47257->47247 47259 409a63 GetMessageA 47258->47259 47260 4099ff SetWindowsHookExA 47258->47260 47261 409a75 TranslateMessage DispatchMessageA 47259->47261 47262 40999c 47259->47262 47260->47259 47264 409a1b GetLastError 47260->47264 47261->47259 47261->47262 47274 41ad46 28 API calls 47264->47274 47266 409a31 47275 404c9e 28 API calls 47266->47275 47268 409a3e 47269 401f66 28 API calls 47268->47269 47270 409a4d 47269->47270 47271 41a686 79 API calls 47270->47271 47272 409a52 47271->47272 47273 401eea 26 API calls 47272->47273 47273->47262 47274->47266 47275->47268 47277 409e5d Sleep 47276->47277 47296 409d97 47277->47296 47279 4099b2 47280 409e9d CreateDirectoryW 47285 409e6f 47280->47285 47281 409eae GetFileAttributesW 47281->47285 47282 401d64 28 API calls 47282->47285 47283 409ec5 SetFileAttributesW 47283->47285 47285->47277 47285->47279 47285->47280 47285->47281 47285->47282 47285->47283 47294 409f10 47285->47294 47309 41b58f 47285->47309 47286 409f3f PathFileExistsW 47286->47294 47288 401f86 28 API calls 47288->47294 47289 40a048 SetFileAttributesW 47289->47285 47290 401eef 26 API calls 47290->47294 47291 406052 28 API calls 47291->47294 47292 401eea 26 API calls 47292->47294 47294->47286 47294->47288 47294->47289 47294->47290 47294->47291 47294->47292 47295 401eea 26 API calls 47294->47295 47318 41b61a 32 API calls 47294->47318 47319 41b687 CreateFileW SetFilePointer WriteFile CloseHandle 47294->47319 47295->47285 47297 409e44 47296->47297 47299 409dad 47296->47299 47297->47285 47298 409dcc CreateFileW 47298->47299 47300 409dda GetFileSize 47298->47300 47299->47298 47301 409e0f CloseHandle 47299->47301 47302 409e21 47299->47302 47303 409e04 Sleep 47299->47303 47304 409dfd 47299->47304 47300->47299 47300->47301 47301->47299 47302->47297 47306 4082dc 28 API calls 47302->47306 47303->47301 47320 40a7f0 83 API calls 47304->47320 47307 409e3d 47306->47307 47308 4098a5 126 API calls 47307->47308 47308->47297 47310 41b5a2 CreateFileW 47309->47310 47312 41b5df 47310->47312 47313 41b5db 47310->47313 47314 41b5f6 WriteFile 47312->47314 47315 41b5e6 SetFilePointer 47312->47315 47313->47285 47316 41b60b CloseHandle 47314->47316 47317 41b609 47314->47317 47315->47314 47315->47316 47316->47313 47317->47316 47318->47294 47319->47294 47320->47303 47323 402d97 47322->47323 47326 4030f7 47323->47326 47325 402dab 47325->47168 47327 403101 47326->47327 47329 403115 47327->47329 47330 4036c2 28 API calls 47327->47330 47329->47325 47330->47329 47332 403b48 47331->47332 47338 403b7a 47332->47338 47335 403cbb 47342 403dc2 47335->47342 47337 403cc9 47337->46798 47339 403b86 47338->47339 47340 403b9e 28 API calls 47339->47340 47341 403b5a 47340->47341 47341->47335 47343 403dce 47342->47343 47346 402ffd 47343->47346 47345 403de3 47345->47337 47347 40300e 47346->47347 47352 4032a4 47347->47352 47351 40302e 47351->47345 47353 4032b0 47352->47353 47354 40301a 47352->47354 47358 4032b6 28 API calls 47353->47358 47354->47351 47357 4035e8 28 API calls 47354->47357 47357->47351 47365 4395ba 47359->47365 47363 412814 47362->47363 47364 4127ed RegSetValueExA RegCloseKey 47362->47364 47363->46821 47364->47363 47368 43953b 47365->47368 47367 401608 47367->46823 47369 43954a 47368->47369 47370 43955e 47368->47370 47376 445354 20 API calls __dosmaperr 47369->47376 47375 43955a __alldvrm 47370->47375 47378 447601 11 API calls 2 library calls 47370->47378 47372 43954f 47377 43a827 26 API calls _Deallocate 47372->47377 47375->47367 47376->47372 47377->47375 47378->47375 47382 41aab9 _Yarn ___scrt_fastfail 47379->47382 47380 401f66 28 API calls 47381 41ab2e 47380->47381 47381->46828 47382->47380 47383->46844 47385 413fb3 getaddrinfo WSASetLastError 47384->47385 47386 413fa9 47384->47386 47385->46878 47431 413e37 35 API calls ___std_exception_copy 47386->47431 47388 413fae 47388->47385 47432 401faa 47389->47432 47391 41bc8a FormatMessageA 47392 41bca8 47391->47392 47393 41bcb6 47391->47393 47394 401f66 28 API calls 47392->47394 47396 41bcc1 LocalFree 47393->47396 47395 41bcb4 47394->47395 47397 401eea 26 API calls 47395->47397 47396->47395 47398 41bcdd 47397->47398 47398->46878 47400 404805 SetEvent CloseHandle 47399->47400 47401 40481c closesocket 47399->47401 47402 40489c 47400->47402 47403 404829 47401->47403 47402->46878 47404 40483f 47403->47404 47434 404ab1 83 API calls 47403->47434 47405 404851 WaitForSingleObject 47404->47405 47406 404892 SetEvent CloseHandle 47404->47406 47435 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47405->47435 47406->47402 47409 404860 SetEvent WaitForSingleObject 47436 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47409->47436 47411 404878 SetEvent CloseHandle CloseHandle 47411->47406 47412->46878 47413->46878 47414->46878 47415->46874 47437 404b1d 101 API calls 47415->47437 47416->46874 47417->46874 47418->46874 47419->46874 47420->46874 47421->46874 47422->46874 47423->46874 47424->46874 47425->46874 47426->46874 47427->46874 47428->46874 47429->46874 47430->46874 47431->47388 47433 401fb2 47432->47433 47433->47391 47434->47404 47435->47409 47436->47411 47439->46941 47440->46966 47441->46965 47442->46955 47443->46960 47444->46967 47447 40e56a 47445->47447 47446 4124b7 3 API calls 47446->47447 47447->47446 47448 40e59c 47447->47448 47450 40e60e 47447->47450 47451 40e5fe Sleep 47447->47451 47449 4082dc 28 API calls 47448->47449 47448->47451 47454 41ae08 28 API calls 47448->47454 47460 401e13 26 API calls 47448->47460 47463 401f66 28 API calls 47448->47463 47467 4126d2 29 API calls 47448->47467 47478 40bf04 73 API calls ___scrt_fastfail 47448->47478 47479 412774 29 API calls 47448->47479 47449->47448 47452 4082dc 28 API calls 47450->47452 47451->47447 47455 40e619 47452->47455 47454->47448 47456 41ae08 28 API calls 47455->47456 47457 40e625 47456->47457 47480 412774 29 API calls 47457->47480 47460->47448 47461 40e638 47462 401e13 26 API calls 47461->47462 47464 40e644 47462->47464 47463->47448 47465 401f66 28 API calls 47464->47465 47466 40e655 47465->47466 47468 4126d2 29 API calls 47466->47468 47467->47448 47469 40e668 47468->47469 47481 411699 TerminateProcess WaitForSingleObject 47469->47481 47471 40e670 ExitProcess 47482 411637 61 API calls 47472->47482 47479->47448 47480->47461 47481->47471

                                Control-flow Graph

                                APIs
                                • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                                • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                                • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                                • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$HandleLibraryLoadModule
                                • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                • API String ID: 384173800-625181639
                                • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 5 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c call 43e820 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 48 40dc96-40dca7 call 401eea 23->48 79 40d9a5-40d9ac call 40bed7 69->79 80 40d96d-40d98c call 401e8f call 4124b7 69->80 70->69 102 40e134-40e154 call 401e8f call 412902 call 4112b5 70->102 90 40d9b5-40d9bc 79->90 91 40d9ae-40d9b0 79->91 80->79 98 40d98e-40d9a4 call 401e8f call 412902 80->98 92 40d9c0-40d9cc call 41a463 90->92 93 40d9be 90->93 96 40dc95 91->96 103 40d9d5-40d9d9 92->103 104 40d9ce-40d9d0 92->104 93->92 96->48 98->79 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 128 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->128 129 40da2d call 4069ba 107->129 117 40d9e0-40d9e2 108->117 120 40d9e4-40d9e9 call 40699d call 4064d0 117->120 121 40d9ee-40da01 call 401d64 call 401e8f 117->121 120->121 121->107 138 40da03-40da09 121->138 163 40db22-40db26 128->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a611 128->164 129->128 138->107 140 40da0b-40da11 138->140 140->107 142 40da13 call 4064d0 140->142 142->107 165 40dcaa-40dd01 call 436050 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->165 166 40db2c-40db33 163->166 164->163 188 40dad7-40db1d call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->188 219 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5e7 165->219 168 40dbb1-40dbbb call 4082d7 166->168 169 40db35-40dbaf call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 166->169 178 40dbc0-40dbe4 call 4022f8 call 4338c8 168->178 169->178 199 40dbf3 178->199 200 40dbe6-40dbf1 call 436050 178->200 188->163 203 40dbf5-40dc40 call 401e07 call 43e349 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 199->203 200->203 257 40dc45-40dc6a call 4338d1 call 401d64 call 40b125 203->257 272 40dd79-40dd7b 219->272 273 40dd5e 219->273 257->219 274 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 257->274 276 40dd81 272->276 277 40dd7d-40dd7f 272->277 275 40dd60-40dd77 call 41beb0 CreateThread 273->275 274->219 292 40dc93 274->292 280 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43360d call 401d64 call 401e8f CreateThread 280->331 292->96 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 342 40def9-40df0c call 401d64 call 401e8f 333->342 343 40debd-40def4 call 43360d call 401d64 call 401e8f CreateThread 333->343 354 40df6c-40df7f call 401d64 call 401e8f 342->354 355 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 342->355 343->342 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 40b95c 354->365 366 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 354->366 355->354 365->366 386 40dfe0-40dfe1 SetProcessDEPPolicy 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 399->404 414 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 401->414 415 40e12a-40e12f call 40cbac call 413fd4 401->415 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 414->433 415->102 434 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->415 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                                APIs
                                  • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                  • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                  • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                  • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                  • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                  • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                  • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                  • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                  • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                  • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                  • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                  • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                  • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                  • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                  • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                  • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe,00000104), ref: 0040D790
                                  • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                • String ID: 0DG$@CG$@CG$Access Level: $Administrator$C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-L31JDJ$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$h5]$licence$license_code.txt
                                • API String ID: 2830904901-647141622
                                • Opcode ID: 944579b638f330601af126a6f3ecdd8afdcd3f1a3e1b8c9077f35c50e9770c29
                                • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                                • Opcode Fuzzy Hash: 944579b638f330601af126a6f3ecdd8afdcd3f1a3e1b8c9077f35c50e9770c29
                                • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1201 4099e4-4099fd 1202 409a63-409a73 GetMessageA 1201->1202 1203 4099ff-409a19 SetWindowsHookExA 1201->1203 1204 409a75-409a8d TranslateMessage DispatchMessageA 1202->1204 1205 409a8f 1202->1205 1203->1202 1208 409a1b-409a61 GetLastError call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1203->1208 1204->1202 1204->1205 1206 409a91-409a96 1205->1206 1208->1206
                                APIs
                                • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                • GetLastError.KERNEL32 ref: 00409A1B
                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                • TranslateMessage.USER32(?), ref: 00409A7A
                                • DispatchMessageA.USER32(?), ref: 00409A85
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                • String ID: Keylogger initialization failure: error $`Mw
                                • API String ID: 3219506041-1277971878
                                • Opcode ID: b25c238cc25c38f6a39b157eec7e909f885e780430bb9e72e24c2f6a8841eb99
                                • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                • Opcode Fuzzy Hash: b25c238cc25c38f6a39b157eec7e909f885e780430bb9e72e24c2f6a8841eb99
                                • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                  • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                  • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                                • Sleep.KERNEL32(00000BB8), ref: 0040E603
                                • ExitProcess.KERNEL32 ref: 0040E672
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseExitOpenProcessQuerySleepValue
                                • String ID: 5.3.0 Pro$h5]$override$pth_unenc
                                • API String ID: 2281282204-806073622
                                • Opcode ID: 5e3dc2ee62b3815afed8a14a75d9f4affef8716378befb7542775b3a197d221c
                                • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                • Opcode Fuzzy Hash: 5e3dc2ee62b3815afed8a14a75d9f4affef8716378befb7542775b3a197d221c
                                • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF
                                APIs
                                • GetComputerNameExW.KERNEL32(00000001,?,0000002B,00474358), ref: 0041A7BF
                                • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Name$ComputerUser
                                • String ID:
                                • API String ID: 4229901323-0
                                • Opcode ID: d080141cef9e3990b2f6bec53120ee530cdf67b1126702e4f13589ad74e7334c
                                • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                • Opcode Fuzzy Hash: d080141cef9e3990b2f6bec53120ee530cdf67b1126702e4f13589ad74e7334c
                                • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 447 413fd4-41401f call 401faa call 41aa73 call 401faa call 401d64 call 401e8f call 43a5e7 460 414021-414028 Sleep 447->460 461 41402e-41407c call 401f66 call 401d64 call 401fbd call 41afc3 call 404262 call 401d64 call 40b125 447->461 460->461 476 4140f0-41418a call 401f66 call 401d64 call 401fbd call 41afc3 call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 461->476 477 41407e-4140ed call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 461->477 530 41419a-4141a1 476->530 531 41418c-414198 476->531 477->476 532 4141a6-414242 call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 413f9a 530->532 531->532 559 414244-414254 WSAGetLastError call 41bc76 532->559 560 41428f-41429d call 4041f1 532->560 564 414259-41428a call 404c9e call 401f66 call 41a686 call 401eea 559->564 565 4142ca-4142df call 404915 call 40428c 560->565 566 41429f-4142c5 call 401f66 * 2 call 41a686 560->566 583 414b54-414b66 call 4047eb call 4020b4 564->583 582 4142e5-414432 call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 4 call 41a96d call 413683 call 4082dc call 440c51 call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 41265d 565->582 565->583 566->583 647 414434-414441 call 40541d 582->647 648 414446-41446d call 401e8f call 412513 582->648 596 414b68-414b88 call 401d64 call 401e8f call 43a5e7 Sleep 583->596 597 414b8e-414b96 call 401d8c 583->597 596->597 597->476 647->648 654 414474-414ac7 call 403b40 call 40cbf1 call 41adee call 41aec8 call 41ad46 call 401d64 GetTickCount call 41ad46 call 41aca0 call 41ad46 * 2 call 41ac52 call 41aec8 * 5 call 40e679 call 41aec8 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 404468 call 401eea * 50 call 401e13 call 401eea * 6 call 401e13 call 4045d5 648->654 655 41446f-414471 648->655 901 414ac9-414ad0 654->901 902 414adb-414ae2 654->902 655->654 901->902 905 414ad2-414ad4 901->905 903 414ae4-414ae9 call 40a767 902->903 904 414aee-414b20 call 405415 call 401f66 * 2 call 41a686 902->904 903->904 916 414b22-414b2e CreateThread 904->916 917 414b34-414b4f call 401eea * 2 call 401e13 904->917 905->902 916->917 917->583
                                APIs
                                • Sleep.KERNEL32(00000000,00000029,004742F8,?,00000000), ref: 00414028
                                • WSAGetLastError.WS2_32 ref: 00414249
                                • Sleep.KERNEL32(00000000,00000002), ref: 00414B88
                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$ErrorLastLocalTime
                                • String ID: | $%I64u$5.3.0 Pro$@CG$C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$Rmc-L31JDJ$TLS Off$TLS On $TUF$XCG$XCG$XCG$`=G$dCG$h5]$hlight$name$>G$>G
                                • API String ID: 524882891-4201620666
                                • Opcode ID: f1a89658d18964bf6250893c77f74ee3cb1d4248ad4f661de846e304ae1b8ac0
                                • Instruction ID: a0bb0b13232d9f5991351636829aab2dda2428bc81dc0b9639db3628de0ead2f
                                • Opcode Fuzzy Hash: f1a89658d18964bf6250893c77f74ee3cb1d4248ad4f661de846e304ae1b8ac0
                                • Instruction Fuzzy Hash: 58524E31A001145ADB18F771DDA6AEE73A59F90708F1041BFB80A771E2EF385E85CA9D

                                Control-flow Graph

                                APIs
                                • Sleep.KERNEL32(00001388), ref: 00409E62
                                  • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                  • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                  • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                  • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                  • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                • API String ID: 3795512280-3163867910
                                • Opcode ID: 478d1cbae2b352f7a85ddd3b94cb29f0f84926477ce6454f32d463d399d219e0
                                • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                                • Opcode Fuzzy Hash: 478d1cbae2b352f7a85ddd3b94cb29f0f84926477ce6454f32d463d399d219e0
                                • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A

                                Control-flow Graph

                                APIs
                                • WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                                • closesocket.WS2_32(?), ref: 0040481F
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404856
                                • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404867
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 0040486E
                                • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404880
                                • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404885
                                • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040488A
                                • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404895
                                • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040489A
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                • String ID:
                                • API String ID: 3658366068-0
                                • Opcode ID: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                                • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                • Opcode Fuzzy Hash: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                                • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48

                                Control-flow Graph

                                APIs
                                • __Init_thread_footer.LIBCMT ref: 0040A456
                                • Sleep.KERNEL32(000001F4), ref: 0040A461
                                • GetForegroundWindow.USER32 ref: 0040A467
                                • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                • Sleep.KERNEL32(000003E8), ref: 0040A574
                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                • String ID: [${ User has been idle for $ minutes }$]
                                • API String ID: 911427763-3954389425
                                • Opcode ID: 547a7cfd8ecb315c382de053530a614a00025319d5b4f46ac54375dc0518001e
                                • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                • Opcode Fuzzy Hash: 547a7cfd8ecb315c382de053530a614a00025319d5b4f46ac54375dc0518001e
                                • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1119 40c89e-40c8c3 call 401e52 1122 40c8c9 1119->1122 1123 40c9ed-40ca13 call 401e07 GetLongPathNameW call 403b40 1119->1123 1125 40c8d0-40c8d5 1122->1125 1126 40c9c2-40c9c7 1122->1126 1127 40c905-40c90a 1122->1127 1128 40c9d8 1122->1128 1129 40c9c9-40c9ce call 43ac0f 1122->1129 1130 40c8da-40c8e8 call 41a74b call 401e18 1122->1130 1131 40c8fb-40c900 1122->1131 1132 40c9bb-40c9c0 1122->1132 1133 40c90f-40c916 call 41b15b 1122->1133 1146 40ca18-40ca85 call 403b40 call 40cc37 call 402860 * 2 call 401e13 * 5 1123->1146 1135 40c9dd-40c9e2 call 43ac0f 1125->1135 1126->1135 1127->1135 1128->1135 1141 40c9d3-40c9d6 1129->1141 1150 40c8ed 1130->1150 1131->1135 1132->1135 1147 40c918-40c968 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1133->1147 1148 40c96a-40c9b6 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1133->1148 1149 40c9e3-40c9e8 call 4082d7 1135->1149 1141->1128 1141->1149 1155 40c8f1-40c8f6 call 401e13 1147->1155 1148->1150 1149->1123 1150->1155 1155->1123
                                APIs
                                • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LongNamePath
                                • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                • API String ID: 82841172-425784914
                                • Opcode ID: f411b4bda197469a8f5fa6f0702ce682b0f23decd79daaf3752e96957329e7a7
                                • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                • Opcode Fuzzy Hash: f411b4bda197469a8f5fa6f0702ce682b0f23decd79daaf3752e96957329e7a7
                                • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                  • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                  • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                  • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                  • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseCurrentOpenQueryValueWow64
                                • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                • API String ID: 782494840-2070987746
                                • Opcode ID: 86bbcbdce1bcc566ec4c7eb9c3f3f89489dcb65e6470f8cc487b0f9213cf0882
                                • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                • Opcode Fuzzy Hash: 86bbcbdce1bcc566ec4c7eb9c3f3f89489dcb65e6470f8cc487b0f9213cf0882
                                • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1290 409d97-409da7 1291 409e44-409e47 1290->1291 1292 409dad-409daf 1290->1292 1293 409db2-409dd8 call 401e07 CreateFileW 1292->1293 1296 409e18 1293->1296 1297 409dda-409de8 GetFileSize 1293->1297 1298 409e1b-409e1f 1296->1298 1299 409dea 1297->1299 1300 409e0f-409e16 CloseHandle 1297->1300 1298->1293 1301 409e21-409e24 1298->1301 1302 409df4-409dfb 1299->1302 1303 409dec-409df2 1299->1303 1300->1298 1301->1291 1304 409e26-409e2d 1301->1304 1305 409e04-409e09 Sleep 1302->1305 1306 409dfd-409dff call 40a7f0 1302->1306 1303->1300 1303->1302 1304->1291 1307 409e2f-409e3f call 4082dc call 4098a5 1304->1307 1305->1300 1306->1305 1307->1291
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleSizeSleep
                                • String ID: `AG
                                • API String ID: 1958988193-3058481221
                                • Opcode ID: b0d5ab9d96485228d01e653f577d9a536d0e325b1c446dee4fcf46d6e6ae2c45
                                • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                • Opcode Fuzzy Hash: b0d5ab9d96485228d01e653f577d9a536d0e325b1c446dee4fcf46d6e6ae2c45
                                • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1312 4126d2-4126e9 RegCreateKeyA 1313 412722 1312->1313 1314 4126eb-412720 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1312->1314 1315 412724-412730 call 401eea 1313->1315 1314->1315
                                APIs
                                • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                • RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                • RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID: HgF$pth_unenc
                                • API String ID: 1818849710-3662775637
                                • Opcode ID: 1bd7bc63bfcb718f8a00b857ba0206b1347799401e36ec3cc1597cb67c32c774
                                • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                • Opcode Fuzzy Hash: 1bd7bc63bfcb718f8a00b857ba0206b1347799401e36ec3cc1597cb67c32c774
                                • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94

                                Control-flow Graph

                                APIs
                                • CreateThread.KERNEL32(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 00409946
                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread$LocalTimewsprintf
                                • String ID: Offline Keylogger Started
                                • API String ID: 465354869-4114347211
                                • Opcode ID: 12a7e14b742792f2f7edc51aeeb20cb2f460560c35512bbf3bc1a56244271605
                                • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                • Opcode Fuzzy Hash: 12a7e14b742792f2f7edc51aeeb20cb2f460560c35512bbf3bc1a56244271605
                                • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1344 4127d5-4127eb RegCreateKeyA 1345 412818-41281b 1344->1345 1346 4127ed-412812 RegSetValueExA RegCloseKey 1344->1346 1346->1345 1347 412814-412817 1346->1347
                                APIs
                                • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                • RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                • RegCloseKey.KERNEL32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID: TUF
                                • API String ID: 1818849710-3431404234
                                • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1348 41b58f-41b5a0 1349 41b5a2-41b5a5 1348->1349 1350 41b5b8-41b5bf 1348->1350 1351 41b5a7-41b5ac 1349->1351 1352 41b5ae-41b5b6 1349->1352 1353 41b5c0-41b5d9 CreateFileW 1350->1353 1351->1353 1352->1353 1354 41b5db-41b5dd 1353->1354 1355 41b5df-41b5e4 1353->1355 1356 41b614-41b619 1354->1356 1357 41b5f6-41b607 WriteFile 1355->1357 1358 41b5e6-41b5f4 SetFilePointer 1355->1358 1359 41b60b-41b612 CloseHandle 1357->1359 1360 41b609 1357->1360 1358->1357 1358->1359 1359->1356 1360->1359
                                APIs
                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0040A009,?,00000000,00000000), ref: 0041B5EB
                                • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A009,?,00000000,00000000), ref: 0041B5FF
                                • CloseHandle.KERNEL32(00000000,?,0040A009,?,00000000,00000000), ref: 0041B60C
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandlePointerWrite
                                • String ID:
                                • API String ID: 3604237281-0
                                • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                APIs
                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                • GetLastError.KERNEL32 ref: 0040BEF1
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateErrorLastMutex
                                • String ID: Rmc-L31JDJ
                                • API String ID: 1925916568-2866027240
                                • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919
                                APIs
                                • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                • RegCloseKey.KERNEL32(?), ref: 0041255F
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: 1a25bcfb25f4c61a33ed6ceb80866840e5ee7adcdacacd2e2e41860cf5e9bac8
                                • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                • Opcode Fuzzy Hash: 1a25bcfb25f4c61a33ed6ceb80866840e5ee7adcdacacd2e2e41860cf5e9bac8
                                • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8
                                APIs
                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                • RegCloseKey.KERNEL32(?), ref: 00412500
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98
                                APIs
                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                                • RegCloseKey.KERNEL32(?,?,?,0040B996,004660E0), ref: 004124A4
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                                • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _wcslen
                                • String ID: xAG
                                • API String ID: 176396367-2759412365
                                • Opcode ID: 5b2808d6a420319a8e352f948dca3b51851caf84ac7e067c3f15d365214f07ca
                                • Instruction ID: 4b5f0267b16b6d1f94f05398eea60063c36f9fdec9e789d07f1c8464d26cb595
                                • Opcode Fuzzy Hash: 5b2808d6a420319a8e352f948dca3b51851caf84ac7e067c3f15d365214f07ca
                                • Instruction Fuzzy Hash: 751193325002049FCB15FF66D8968EF7BA4EF64314B10453FF842622E2EF38A955CB98
                                APIs
                                • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,0040440B,00000000,00000000,00475B70), ref: 0041BC9E
                                • LocalFree.KERNEL32(0040440B,0040440B,?,?,?,?,?,?,?,?,0040440B), ref: 0041BCC4
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FormatFreeLocalMessage
                                • String ID:
                                • API String ID: 1427518018-0
                                • Opcode ID: 13f8017497bfc80015491988e3138674ee6dd7b45e3f7669173c54548a5d5469
                                • Instruction ID: 3eb85724c12076c4d2eca72925feb3a8121d4a7150c9d5d782cbd246f65a5107
                                • Opcode Fuzzy Hash: 13f8017497bfc80015491988e3138674ee6dd7b45e3f7669173c54548a5d5469
                                • Instruction Fuzzy Hash: 29F0C870B00105B6CF08A7A6DC4ADFF767DDB80305B10003FB502B21D1EE789E05D658
                                APIs
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                  • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,00434411,?,?,?,?,?,?,?,?,00434411,?,0046D644,0041AD75,?), ref: 00437C37
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Exception@8Throw$ExceptionRaise
                                • String ID:
                                • API String ID: 3476068407-0
                                • Opcode ID: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                                • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                                • Opcode Fuzzy Hash: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                                • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D
                                APIs
                                • getaddrinfo.WS2_32(00000000,00000000,00000000,00471B28,00474358,00000000,00414240,00000000,00000001), ref: 00413FBC
                                • WSASetLastError.WS2_32(00000000), ref: 00413FC1
                                  • Part of subcall function 00413E37: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                  • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                  • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                  • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                  • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413F27
                                  • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                  • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                  • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                • String ID:
                                • API String ID: 1170566393-0
                                • Opcode ID: de7c912f5844d1f7c2d429620844517faabbfd26de99632591fe9930316e04d8
                                • Instruction ID: 9c65b6197a0e8ce5e429e224625e4c370c9a1848c9e97f9a588a6d75e163472b
                                • Opcode Fuzzy Hash: de7c912f5844d1f7c2d429620844517faabbfd26de99632591fe9930316e04d8
                                • Instruction Fuzzy Hash: 4ED05B326406216FB310575D6D01FFBB5DCDFA67617150077F408D7110D6945D82C3AD
                                APIs
                                • RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateHeap
                                • String ID:
                                • API String ID: 1279760036-0
                                • Opcode ID: 382123f4ff15faebfb065adfee4593ee0e25617df91b7722ec70fd9da05ca189
                                • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                • Opcode Fuzzy Hash: 382123f4ff15faebfb065adfee4593ee0e25617df91b7722ec70fd9da05ca189
                                • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                APIs
                                • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Startup
                                • String ID:
                                • API String ID: 724789610-0
                                • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                                • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                                APIs
                                • SetEvent.KERNEL32(?,?), ref: 00406F28
                                • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                  • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,h5],004742F8), ref: 0041B489
                                  • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,h5],004742F8), ref: 0041B4BB
                                  • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,h5],004742F8), ref: 0041B50C
                                  • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,h5],004742F8), ref: 0041B561
                                  • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,h5],004742F8), ref: 0041B568
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                  • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                  • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                  • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                  • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                  • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                • DeleteFileA.KERNEL32(?), ref: 004078CC
                                  • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                  • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                  • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                • Sleep.KERNEL32(000007D0), ref: 00407976
                                • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                  • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$TTF$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                • API String ID: 2918587301-184849705
                                • Opcode ID: 109762e14f081899f316a0c86557f709d120da9deb23fb19cdec9e97db7f9f3e
                                • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                                • Opcode Fuzzy Hash: 109762e14f081899f316a0c86557f709d120da9deb23fb19cdec9e97db7f9f3e
                                • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 0040508E
                                  • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                  • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                • __Init_thread_footer.LIBCMT ref: 004050CB
                                • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                                • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                  • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                  • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                  • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                • CloseHandle.KERNEL32 ref: 004053CD
                                • CloseHandle.KERNEL32 ref: 004053D5
                                • CloseHandle.KERNEL32 ref: 004053E7
                                • CloseHandle.KERNEL32 ref: 004053EF
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                                • API String ID: 3815868655-81343324
                                • Opcode ID: 337a49e8742ab2c01242c4b22f0744304ac18e8bf87bb2f2211614297787c81e
                                • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                • Opcode Fuzzy Hash: 337a49e8742ab2c01242c4b22f0744304ac18e8bf87bb2f2211614297787c81e
                                • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                APIs
                                • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                  • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                  • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                  • Part of subcall function 004127D5: RegCloseKey.KERNEL32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                  • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                  • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                  • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                                • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                • String ID: 0DG$Remcos restarted by watchdog!$TTF$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$h5]$rmclient.exe$svchost.exe
                                • API String ID: 65172268-838393571
                                • Opcode ID: 13534fb87cbc39d3247b244c893d635fc72677ab580a1e7e2fcadcea4b6fcd11
                                • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                                • Opcode Fuzzy Hash: 13534fb87cbc39d3247b244c893d635fc72677ab580a1e7e2fcadcea4b6fcd11
                                • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                • FindClose.KERNEL32(00000000), ref: 0040B517
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseFile$FirstNext
                                • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                • API String ID: 1164774033-3681987949
                                • Opcode ID: 8a573f4cde42bb8974b55a1bb9849f05b01946ec243df485f40a07b19650f4e4
                                • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                • Opcode Fuzzy Hash: 8a573f4cde42bb8974b55a1bb9849f05b01946ec243df485f40a07b19650f4e4
                                • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$Close$File$FirstNext
                                • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                • API String ID: 3527384056-432212279
                                • Opcode ID: e3298efea2014f122d9e4da4ca7a52805c3aaa742dc7125d16785d6f153ddc68
                                • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                • Opcode Fuzzy Hash: e3298efea2014f122d9e4da4ca7a52805c3aaa742dc7125d16785d6f153ddc68
                                • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                  • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                  • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                  • Part of subcall function 004127D5: RegCloseKey.KERNEL32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$h5]$ieinstal.exe$ielowutil.exe
                                • API String ID: 726551946-802999302
                                • Opcode ID: c6b8a8b98bbd4d63e6190979d81124dee66bc740cd9cc34f4ffc17523aed10bc
                                • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                • Opcode Fuzzy Hash: c6b8a8b98bbd4d63e6190979d81124dee66bc740cd9cc34f4ffc17523aed10bc
                                • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                APIs
                                • OpenClipboard.USER32 ref: 004159C7
                                • EmptyClipboard.USER32 ref: 004159D5
                                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                • CloseClipboard.USER32 ref: 00415A5A
                                • OpenClipboard.USER32 ref: 00415A61
                                • GetClipboardData.USER32(0000000D), ref: 00415A71
                                • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                • CloseClipboard.USER32 ref: 00415A89
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                • String ID:
                                • API String ID: 3520204547-0
                                • Opcode ID: 4a8e1bf9e51489589eed0e64b8e8dfa09910261a21e34244e6abf14547ac5879
                                • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                                • Opcode Fuzzy Hash: 4a8e1bf9e51489589eed0e64b8e8dfa09910261a21e34244e6abf14547ac5879
                                • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,h5],004742F8), ref: 0041B489
                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,h5],004742F8), ref: 0041B4BB
                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,h5],004742F8), ref: 0041B529
                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,h5],004742F8), ref: 0041B536
                                  • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,h5],004742F8), ref: 0041B50C
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,h5],004742F8), ref: 0041B561
                                • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,h5],004742F8), ref: 0041B568
                                • GetLastError.KERNEL32(?,?,?,?,?,?,h5],004742F8), ref: 0041B570
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,h5],004742F8), ref: 0041B583
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                • String ID: h5]
                                • API String ID: 2341273852-242134133
                                • Opcode ID: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                • Opcode Fuzzy Hash: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0$1$2$3$4$5$6$7
                                • API String ID: 0-3177665633
                                • Opcode ID: b1fb05e11c356ba634f14b88ac069ae329bf2eb132947a5908c699400be529fa
                                • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                • Opcode Fuzzy Hash: b1fb05e11c356ba634f14b88ac069ae329bf2eb132947a5908c699400be529fa
                                • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                APIs
                                • GetForegroundWindow.USER32(?,?,004740F8), ref: 00409B3F
                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                • GetKeyState.USER32(00000010), ref: 00409B5C
                                • GetKeyboardState.USER32(?,?,004740F8), ref: 00409B67
                                • ToUnicodeEx.USER32(0047414C,00000000,?,?,00000010,00000000,00000000), ref: 00409B8A
                                • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                • ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                • String ID: 8[G
                                • API String ID: 1888522110-1691237782
                                • Opcode ID: 925a5eb4e75251b1def6021025d6fe2bb9c2de734200d7c4e5adce8016dcfecb
                                • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                • Opcode Fuzzy Hash: 925a5eb4e75251b1def6021025d6fe2bb9c2de734200d7c4e5adce8016dcfecb
                                • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                APIs
                                • _wcslen.LIBCMT ref: 00406788
                                • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object_wcslen
                                • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                • API String ID: 240030777-3166923314
                                • Opcode ID: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                • Opcode Fuzzy Hash: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                • GetLastError.KERNEL32 ref: 00419935
                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                • String ID:
                                • API String ID: 3587775597-0
                                • Opcode ID: 3a18b40fc8bca66ce2ef311a5ab80dcc0462769fed9f9a4927e242865a08ad00
                                • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                • Opcode Fuzzy Hash: 3a18b40fc8bca66ce2ef311a5ab80dcc0462769fed9f9a4927e242865a08ad00
                                • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004514C3
                                • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                • GetLocaleInfoW.KERNEL32(?,00001001,<D,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 00451594
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                • String ID: <D$<D$<D
                                • API String ID: 745075371-3495170934
                                • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                                • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                  • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Find$CreateFirstNext
                                • String ID: @CG$XCG$`HG$`HG$>G
                                • API String ID: 341183262-3780268858
                                • Opcode ID: 0bcbbfc288096691e933d03161bfe35dfff0b2aa5358a68bc5ca1801f316b0f7
                                • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                                • Opcode Fuzzy Hash: 0bcbbfc288096691e933d03161bfe35dfff0b2aa5358a68bc5ca1801f316b0f7
                                • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                                APIs
                                • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressCloseCreateLibraryLoadProcsend
                                • String ID: SHDeleteKeyW$Shlwapi.dll
                                • API String ID: 2127411465-314212984
                                • Opcode ID: 4217f14abb78fa8da617c6d45accd85cc3e0ee4241937757da6932c8709ce55d
                                • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                                • Opcode Fuzzy Hash: 4217f14abb78fa8da617c6d45accd85cc3e0ee4241937757da6932c8709ce55d
                                • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                APIs
                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                • GetLastError.KERNEL32 ref: 0040B261
                                Strings
                                • UserProfile, xrefs: 0040B227
                                • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                • [Chrome StoredLogins not found], xrefs: 0040B27B
                                • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteErrorFileLast
                                • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                • API String ID: 2018770650-1062637481
                                • Opcode ID: 4cd32df34f682fcf287b1bbdb8b1e04e90f5886a02fc20745afa94da3ae3815b
                                • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                                • Opcode Fuzzy Hash: 4cd32df34f682fcf287b1bbdb8b1e04e90f5886a02fc20745afa94da3ae3815b
                                • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                                APIs
                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                • GetLastError.KERNEL32 ref: 00416B02
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                • String ID: SeShutdownPrivilege
                                • API String ID: 3534403312-3733053543
                                • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: __floor_pentium4
                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                • API String ID: 4168288129-2761157908
                                • Opcode ID: 66bc95b00190c33de1dc88885a8d3c2e2540cf288971a00217ef3550ead5f7a6
                                • Instruction ID: 57cc16b57fb9b80973019f24a4c29afa226e887048a240d5689d112d8919aadd
                                • Opcode Fuzzy Hash: 66bc95b00190c33de1dc88885a8d3c2e2540cf288971a00217ef3550ead5f7a6
                                • Instruction Fuzzy Hash: 08C26F72D046288FDB25CE28DD407EAB7B5EB44346F1441EBD84DE7242E778AE898F44
                                APIs
                                • __EH_prolog.LIBCMT ref: 004089AE
                                  • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                  • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                  • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                  • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                  • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                  • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                  • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                • String ID:
                                • API String ID: 4043647387-0
                                • Opcode ID: ee0780a88fd9297620b49bb59274a10587c6a93ca7e271978843c6db32b648ea
                                • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                                • Opcode Fuzzy Hash: ee0780a88fd9297620b49bb59274a10587c6a93ca7e271978843c6db32b648ea
                                • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ManagerStart
                                • String ID:
                                • API String ID: 276877138-0
                                • Opcode ID: 6d0f589b7f4ed5c193fffaa70fef351a53496163331b96a9b3d3840ad54bf661
                                • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                • Opcode Fuzzy Hash: 6d0f589b7f4ed5c193fffaa70fef351a53496163331b96a9b3d3840ad54bf661
                                • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                APIs
                                  • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                  • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                  • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                  • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                  • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                • String ID: PowrProf.dll$SetSuspendState
                                • API String ID: 1589313981-1420736420
                                • Opcode ID: edc00706272dc8694fa210cddba580f6438878c4cc72cf4b9022d3c1a848817e
                                • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                                • Opcode Fuzzy Hash: edc00706272dc8694fa210cddba580f6438878c4cc72cf4b9022d3c1a848817e
                                • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                                APIs
                                • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 0045127C
                                • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 004512A5
                                • GetACP.KERNEL32(?,?,00451502,?,00000000), ref: 004512BA
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID: ACP$OCP
                                • API String ID: 2299586839-711371036
                                • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                APIs
                                • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                                • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$FindLoadLockSizeof
                                • String ID: SETTINGS
                                • API String ID: 3473537107-594951305
                                • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                APIs
                                • __EH_prolog.LIBCMT ref: 00407A91
                                • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$File$CloseFirstH_prologNext
                                • String ID:
                                • API String ID: 1157919129-0
                                • Opcode ID: 46eaf1de8721050399aceeeffa6b8ddb07bc60cda3e18ddf1bef56fed7617948
                                • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                • Opcode Fuzzy Hash: 46eaf1de8721050399aceeeffa6b8ddb07bc60cda3e18ddf1bef56fed7617948
                                • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                APIs
                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                                • _free.LIBCMT ref: 00448067
                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                • _free.LIBCMT ref: 00448233
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                • String ID:
                                • API String ID: 1286116820-0
                                • Opcode ID: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                • Instruction ID: adcac59616ce0bf4d9b6f5e4feac4fc1c4b096f081e8a0f87c9a15d47e4c4f65
                                • Opcode Fuzzy Hash: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                • Instruction Fuzzy Hash: 13510B719002099BE714DF69DC819AFB7BCEF41354F10456FE454A32A1EF389E46CB58
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                Strings
                                • open, xrefs: 0040622E
                                • C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, xrefs: 0040627F, 004063A7
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DownloadExecuteFileShell
                                • String ID: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe$open
                                • API String ID: 2825088817-2664827701
                                • Opcode ID: 6d353ccf295deaf82566791d5b76c42446060e1fbe94e9ccc67dd68f3c330a28
                                • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                                • Opcode Fuzzy Hash: 6d353ccf295deaf82566791d5b76c42446060e1fbe94e9ccc67dd68f3c330a28
                                • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileFind$FirstNextsend
                                • String ID: x@G$x@G
                                • API String ID: 4113138495-3390264752
                                • Opcode ID: 78527834d5967a8305f521ec04368930b73d07c6febb1a3811bdf86b1f9949ed
                                • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                • Opcode Fuzzy Hash: 78527834d5967a8305f521ec04368930b73d07c6febb1a3811bdf86b1f9949ed
                                • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                APIs
                                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                  • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                  • Part of subcall function 004126D2: RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                  • Part of subcall function 004126D2: RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateInfoParametersSystemValue
                                • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                • API String ID: 4127273184-3576401099
                                • Opcode ID: 3d360fdf2e78990b0619b3c2804760803c56fcbcebbcac8b827f4f8c51bc1c9b
                                • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                • Opcode Fuzzy Hash: 3d360fdf2e78990b0619b3c2804760803c56fcbcebbcac8b827f4f8c51bc1c9b
                                • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443CF3,?,?,?,?,?,?,00000004), ref: 00450B61
                                • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443CF3,00000000,00443E13), ref: 00450CA2
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                • String ID:
                                • API String ID: 4212172061-0
                                • Opcode ID: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                • Opcode Fuzzy Hash: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                APIs
                                • __EH_prolog.LIBCMT ref: 00408DAC
                                • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileFind$FirstH_prologNext
                                • String ID:
                                • API String ID: 301083792-0
                                • Opcode ID: d6cdaf8c499078e499f84ffb3e77f4738ec248ef72dde797b3892744a407d8f9
                                • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                                • Opcode Fuzzy Hash: d6cdaf8c499078e499f84ffb3e77f4738ec248ef72dde797b3892744a407d8f9
                                • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorInfoLastLocale$_free$_abort
                                • String ID:
                                • API String ID: 2829624132-0
                                • Opcode ID: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                                • Opcode Fuzzy Hash: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                                APIs
                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 0043A755
                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 0043A75F
                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 0043A76C
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                • String ID:
                                • API String ID: 3906539128-0
                                • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                APIs
                                • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                                • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                                • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Crypt$Context$AcquireRandomRelease
                                • String ID:
                                • API String ID: 1815803762-0
                                • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                APIs
                                • GetCurrentProcess.KERNEL32(?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 00442575
                                • TerminateProcess.KERNEL32(00000000,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 0044257C
                                • ExitProcess.KERNEL32 ref: 0044258E
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CurrentExitTerminate
                                • String ID:
                                • API String ID: 1703294689-0
                                • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88
                                APIs
                                • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150C3,00000000), ref: 0041ACCC
                                • NtSuspendProcess.NTDLL(00000000), ref: 0041ACD9
                                • CloseHandle.KERNEL32(00000000,?,?,004150C3,00000000), ref: 0041ACE2
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseHandleOpenSuspend
                                • String ID:
                                • API String ID: 1999457699-0
                                • Opcode ID: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                • Instruction ID: f0940f0a464cb9da12e036c8bcda16370f3965740af83b573a45ae51f9acba0f
                                • Opcode Fuzzy Hash: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                • Instruction Fuzzy Hash: E7D0A733605131638221176A7C0CC87EE6CDFC1EB37024136F404C3220DA30C84186F4
                                APIs
                                • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150E8,00000000), ref: 0041ACF8
                                • NtResumeProcess.NTDLL(00000000), ref: 0041AD05
                                • CloseHandle.KERNEL32(00000000,?,?,004150E8,00000000), ref: 0041AD0E
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseHandleOpenResume
                                • String ID:
                                • API String ID: 3614150671-0
                                • Opcode ID: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                • Instruction ID: b64f47c6af987b25b68fadd97e6a7e629856a7b738c344dffca8a71896aa998e
                                • Opcode Fuzzy Hash: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                • Instruction Fuzzy Hash: DFD0A733504132638220176A7C0CC87EDADDFC5EB37024236F404C3621DA34C841C6F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: .
                                • API String ID: 0-248832578
                                • Opcode ID: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                • Instruction ID: db76f937e81630575b2700384d205b0ac401e8f874fa32e43cac1aabc581782c
                                • Opcode Fuzzy Hash: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                • Instruction Fuzzy Hash: CB310471900209AFEB249E79CC84EEB7BBDDB86318F1101AEF91897251E6389D458B64
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • EnumSystemLocalesW.KERNEL32(00450E6A,00000001,00000000,?,<D,?,00451497,00000000,?,?,?), ref: 00450DB4
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                • String ID: <D
                                • API String ID: 1084509184-3866323178
                                • Opcode ID: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                                • Opcode Fuzzy Hash: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • EnumSystemLocalesW.KERNEL32(004510BA,00000001,?,?,<D,?,0045145B,<D,?,?,?,?,?,00443CEC,?,?), ref: 00450E29
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                • String ID: <D
                                • API String ID: 1084509184-3866323178
                                • Opcode ID: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                                • Opcode Fuzzy Hash: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                                APIs
                                • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID: GetLocaleInfoEx
                                • API String ID: 2299586839-2904428671
                                • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                                • Instruction ID: cffdc6bb8eb20f5336ace8b102e865ec7dcfb2cf624fb46ac032ba80a60d6a90
                                • Opcode Fuzzy Hash: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                                • Instruction Fuzzy Hash: 8A024C71E002199BEF14CFA9C9806AEBBF1FF88314F25826AD919E7350D735AD45CB84
                                APIs
                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004520CD,?,?,00000008,?,?,00455412,00000000), ref: 004522FF
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionRaise
                                • String ID:
                                • API String ID: 3997070919-0
                                • Opcode ID: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                                • Instruction ID: 47108b7899804ebb5d40a9255b8f0d240b678f8396b787326aeb691ef157153f
                                • Opcode Fuzzy Hash: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                                • Instruction Fuzzy Hash: C0B18F351106089FD715CF28C586B567BE0FF06325F29869AEC99CF3A2C379E986CB44
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0
                                • API String ID: 0-4108050209
                                • Opcode ID: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                                • Instruction ID: f72c02501a8b687524d4eed2bba9748ce27a8789a4669d3223b659a6f876a8a8
                                • Opcode Fuzzy Hash: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                                • Instruction Fuzzy Hash: 8002B3727083004BD714DF39D95272EF3E2AFCC758F15492EF499AB391DA78A8058A4A
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free$InfoLocale_abort
                                • String ID:
                                • API String ID: 1663032902-0
                                • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$InfoLocale_abort_free
                                • String ID:
                                • API String ID: 2692324296-0
                                • Opcode ID: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                • Opcode Fuzzy Hash: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                APIs
                                  • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(-00471558,?,0044225B,00000000,0046DAC0,0000000C,00442216,0000000A,?,?,00448739,0000000A,?,00446F74,00000001,00000364), ref: 00444ADB
                                • EnumSystemLocalesW.KERNEL32(00447068,00000001,0046DC48,0000000C), ref: 004470E6
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                • String ID:
                                • API String ID: 1272433827-0
                                • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • EnumSystemLocalesW.KERNEL32(00450C4E,00000001,?,?,?,004514B9,<D,?,?,?,?,?,00443CEC,?,?,?), ref: 00450D2E
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                • String ID:
                                • API String ID: 1084509184-0
                                • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                                • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                                APIs
                                • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID:
                                • API String ID: 2299586839-0
                                • Opcode ID: 2f0bd58ff2c46692be8fd04023cab22914861fe3b087e1ba55e03f3e1b92ba33
                                • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                • Opcode Fuzzy Hash: 2f0bd58ff2c46692be8fd04023cab22914861fe3b087e1ba55e03f3e1b92ba33
                                • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: recv
                                • String ID:
                                • API String ID: 1507349165-0
                                • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                                • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                                • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                • Instruction Fuzzy Hash:
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0
                                • API String ID: 0-4108050209
                                • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                • Instruction ID: e47b97b21f836cd03f295ee90de6feb37cae4df0254a032430ab3cefd666e269
                                • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                • Instruction Fuzzy Hash: C851AC3160070457DF388A6985DA7BF6B959B0E700F18352FE48AFB382C60DED02979E
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: @
                                • API String ID: 0-2766056989
                                • Opcode ID: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                • Instruction ID: 4dd25ef8aece06dcbd44762d080e1d81d96ea4c89eb3931c7e752ffea448aa68
                                • Opcode Fuzzy Hash: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                • Instruction Fuzzy Hash: 99417576A083158FC314CE29D18021BFBE1FBC8300F568A2EF99693350D679E980CB86
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: HeapProcess
                                • String ID:
                                • API String ID: 54951025-0
                                • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b5ca945c73f96586680b794a2cfc8b55e8f7bc2f58380cec5295694457d85c5e
                                • Instruction ID: 1fbb2d6a6e610910e1865e113166bba559d0ad1400e2c5ed2b94208389d41108
                                • Opcode Fuzzy Hash: b5ca945c73f96586680b794a2cfc8b55e8f7bc2f58380cec5295694457d85c5e
                                • Instruction Fuzzy Hash: 4E323621D2AF014DE7639634C862336A649AFB73C5F19D737F81AB5AA6EB2CC4C34105
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f36ab663cb4d239ef1e0a5f108238eabc662f1d3d061ede5d5b4150ec9228ddd
                                • Instruction ID: 2a34495ee4f42e5442afe8381c33b9994a027dd0bc8bc0cc3fe6fc4803c66e78
                                • Opcode Fuzzy Hash: f36ab663cb4d239ef1e0a5f108238eabc662f1d3d061ede5d5b4150ec9228ddd
                                • Instruction Fuzzy Hash: 9732C1796087469BD714DF2AC4807ABB7E1BF84304F444A2EFC958B381D778DD858B8A
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                                • Instruction ID: 022d1978040d43b7ea9bbfc0a41ffb8b00617051ae00cac38c3f572af68edcce
                                • Opcode Fuzzy Hash: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                                • Instruction Fuzzy Hash: 0D028F717046518FD318CF2EE880536B7E1AF8E301B46863EE585C7395EB74E922CB95
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 74e588301cf54894560b91a60f0e3518b6bdc06a9ff6f3e52f80e31c4ce3b340
                                • Instruction ID: dd4ce2a6fae4266494c2f053a510589cf36d02151b1693af83bcfdcd1697f2cb
                                • Opcode Fuzzy Hash: 74e588301cf54894560b91a60f0e3518b6bdc06a9ff6f3e52f80e31c4ce3b340
                                • Instruction Fuzzy Hash: 55F13B716142548FC314DF1DE89187BB3E0EB8A301B460A2EF5C2D7392DB78E91ADB56
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7363a9fedaeb76f2bf31ad894624b0994c444190ff40f401d8ef5418a52334f3
                                • Instruction ID: a134442df30985c3d9ded0ed06b90328dea8838589cb671b1bd0994677c35241
                                • Opcode Fuzzy Hash: 7363a9fedaeb76f2bf31ad894624b0994c444190ff40f401d8ef5418a52334f3
                                • Instruction Fuzzy Hash: 60D1A171A083158BC721DE29C88096FB7E4FFD8354F446A2EF88597361EB38DD058B86
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1d5f87b89f6cc3a45a9bf331663a41d894a757e8db0ddd404c7656d5df1518eb
                                • Instruction ID: 86422b113df266cbb8d28aa4d41e6099a1760efb4c6ea83322c03ecd969c618c
                                • Opcode Fuzzy Hash: 1d5f87b89f6cc3a45a9bf331663a41d894a757e8db0ddd404c7656d5df1518eb
                                • Instruction Fuzzy Hash: 46B1817951429A8ACB05EF28C4913F63BA1EF6A300F4851B9EC9CCF757D3399506EB24
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                • Instruction ID: c2ccfb52f11e3b3b259396a7657262a28929e77abe156aeb413db61674ad6f9a
                                • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                • Instruction Fuzzy Hash: EB91C8722080A319DB2D463E847403FFFE19A563A1B1BA79FD4F2CB2C5EE18D564D624
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                • Instruction ID: 4bc7a19b78b3923bd294324807b23a5e70e392b11aa895e474023c0768c286cc
                                • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                • Instruction Fuzzy Hash: 1C91B6762080A35ADB2D463AC43403FFFE15A563A1B1B979FD4F2CB2C5EE18C568D624
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                • Instruction ID: 8cd81e8b6c8cb135a2d00aee0b4681899237c427d703fcd1ed6b13232f465ad6
                                • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                • Instruction Fuzzy Hash: 439195722090A35ADB2D463D843403FFFE15E5A3A1B1B979FD4F2CB2C5EE28C5649624
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                                • Instruction ID: 3f92c48b0efc6548e9d2ace3e3fdbc0fca8b075b553eb95927f683fa27391a83
                                • Opcode Fuzzy Hash: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                                • Instruction Fuzzy Hash: A4613471E0070867DE385928B896BBF23A8AB0D708F24755BE942DB381D65DDD43C24E
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                                • Instruction ID: a817909710d0090f483bb13cdd1d1ee80d6dfae79024daed79820ace932836b2
                                • Opcode Fuzzy Hash: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                                • Instruction Fuzzy Hash: E361777160070966DA385A2858D6BBF6396EB0DB04F10391BE943FF3C1D61DAD43874E
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                • Instruction ID: b40c52ae0115b4061fe2d1036eda9829452ee7622c5651f608d151b30f65a328
                                • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                • Instruction Fuzzy Hash: B081C4722090A319DB2D463E843403FFFE15A563A5B1BA7AFD4F2CB2C5EE18C5649624
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                • Instruction ID: 61f6cd4e2a94a36a6652522188f48ed2bcd63c305fdb574287b7df62abf21a4e
                                • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                • Instruction Fuzzy Hash: BB51677170460D9BDB34E96894E77BFA3899B0E344F18350BD882B7382D60CED02939E
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                                • Instruction ID: 42e819d74c2f676ea4fb49a2469d6a41ac5eaf2d1859dcf64078451750f97267
                                • Opcode Fuzzy Hash: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                                • Instruction Fuzzy Hash: 49614E32A083119FC308DF35E581A5BB7E5FFDC718F550E1EF48996151E674EA088B8A
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                • Instruction ID: d77b428d8deff70f46db9a150fef47e19855adfe796a652afc1ecdf390514463
                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                • Instruction Fuzzy Hash: D1110BF724C18143EE74862DD8B46B7A795EACE320F2C636BD0C14B758D52A99459908
                                APIs
                                • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                                • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                  • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                                • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                                • DeleteDC.GDI32(?), ref: 0041805D
                                • DeleteDC.GDI32(00000000), ref: 00418060
                                • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                                • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                                • GetCursorInfo.USER32(?), ref: 004180B5
                                • GetIconInfo.USER32(?,?), ref: 004180CB
                                • DeleteObject.GDI32(?), ref: 004180FA
                                • DeleteObject.GDI32(?), ref: 00418107
                                • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                                • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                                • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                                • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                                • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                                • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                                • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                                • DeleteDC.GDI32(?), ref: 0041827F
                                • DeleteDC.GDI32(00000000), ref: 00418282
                                • DeleteObject.GDI32(00000000), ref: 00418285
                                • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                                • DeleteObject.GDI32(00000000), ref: 00418344
                                • GlobalFree.KERNEL32(?), ref: 0041834B
                                • DeleteDC.GDI32(?), ref: 0041835B
                                • DeleteDC.GDI32(00000000), ref: 00418366
                                • DeleteDC.GDI32(?), ref: 00418398
                                • DeleteDC.GDI32(00000000), ref: 0041839B
                                • DeleteObject.GDI32(?), ref: 004183A1
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                                • String ID: DISPLAY
                                • API String ID: 1352755160-865373369
                                • Opcode ID: 1713e221986eac5e09055e201b2983f957a8c2628f8d93144efb6ff1e3dc8593
                                • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                                • Opcode Fuzzy Hash: 1713e221986eac5e09055e201b2983f957a8c2628f8d93144efb6ff1e3dc8593
                                • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                                APIs
                                • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                • ResumeThread.KERNEL32(?), ref: 00417582
                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                • GetLastError.KERNEL32 ref: 004175C7
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`Mw$ntdll
                                • API String ID: 4188446516-1701449367
                                • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                                APIs
                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                • ExitProcess.KERNEL32 ref: 0041151D
                                  • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                  • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                  • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                  • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                  • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                  • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                  • Part of subcall function 004127D5: RegCloseKey.KERNEL32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                  • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0040A009,?,00000000,00000000), ref: 0041B5EB
                                  • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A009,?,00000000,00000000), ref: 0041B5FF
                                  • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000,?,0040A009,?,00000000,00000000), ref: 0041B60C
                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                  • Part of subcall function 0041B58F: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                • API String ID: 4250697656-2665858469
                                • Opcode ID: 7f1ed21a8f9ec2c6bc20c89f454dfa14423f7449cf21d358318308e86ee4bfa1
                                • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                • Opcode Fuzzy Hash: 7f1ed21a8f9ec2c6bc20c89f454dfa14423f7449cf21d358318308e86ee4bfa1
                                • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                APIs
                                  • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                  • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040C3B7
                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040C3E7
                                  • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,h5],004742F8,?,pth_unenc), ref: 0040AFC9
                                  • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                  • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                  • Part of subcall function 0041B58F: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C632
                                • ExitProcess.KERNEL32 ref: 0040C63E
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                • String ID: """, 0$")$@CG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                • API String ID: 1861856835-3168347843
                                • Opcode ID: 65ab949301b5b3d8639a32b56c5dc78fae3f7335a75fc2ee329a3fe9e499b150
                                • Instruction ID: c8b5e11b4abf5c95f8ab28b2bb359051ef64700817c412cd349ec45860bdb676
                                • Opcode Fuzzy Hash: 65ab949301b5b3d8639a32b56c5dc78fae3f7335a75fc2ee329a3fe9e499b150
                                • Instruction Fuzzy Hash: EB9175316042005AC314FB25D852ABF7799AF91718F10453FF98A631E2EF7CAD49C69E
                                APIs
                                  • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                  • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                  • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,h5],004742F8,?,pth_unenc), ref: 0040AFC9
                                  • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                  • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                  • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,774D3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                • ExitProcess.KERNEL32 ref: 0040C287
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$h5]$open$pth_unenc$wend$while fso.FileExists("
                                • API String ID: 3797177996-1769661269
                                • Opcode ID: 370c10820b093f14fed5df3d00b46a5de93c8f0b8d673d9fb6d6526132f7967a
                                • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                                • Opcode Fuzzy Hash: 370c10820b093f14fed5df3d00b46a5de93c8f0b8d673d9fb6d6526132f7967a
                                • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                                APIs
                                • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                                • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                                • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                                • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                                • SetEvent.KERNEL32 ref: 0041A38A
                                • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                • CloseHandle.KERNEL32 ref: 0041A3AB
                                • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                                • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                • String ID: alias audio$" type $TUF$close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                • API String ID: 738084811-2745919808
                                • Opcode ID: bedb79d6b777c24a058fb07aaadb0652bc7d041f343cfefae731751c07e31b37
                                • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                • Opcode Fuzzy Hash: bedb79d6b777c24a058fb07aaadb0652bc7d041f343cfefae731751c07e31b37
                                • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                APIs
                                • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Write$Create
                                • String ID: RIFF$WAVE$data$fmt
                                • API String ID: 1602526932-4212202414
                                • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                APIs
                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe,00000001,004068B2,C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe,00000003,004068DA,h5],00406933), ref: 004064F4
                                • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                • API String ID: 1646373207-2970634579
                                • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$EnvironmentVariable$_wcschr
                                • String ID: h ]
                                • API String ID: 3899193279-970672737
                                • Opcode ID: 6267e3def292f84dd9e33adbac7387806370fb3e846e7c9bec72720c454fd2de
                                • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                • Opcode Fuzzy Hash: 6267e3def292f84dd9e33adbac7387806370fb3e846e7c9bec72720c454fd2de
                                • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                APIs
                                • _wcslen.LIBCMT ref: 0040BC75
                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                • _wcslen.LIBCMT ref: 0040BD54
                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe,00000000,00000000), ref: 0040BDF2
                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                • _wcslen.LIBCMT ref: 0040BE34
                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                • ExitProcess.KERNEL32 ref: 0040BED0
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                • String ID: 6$C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe$del$h5]$open
                                • API String ID: 1579085052-3224760467
                                • Opcode ID: 3074b94dd0db5ede3fe92545a612de18a9a35f6e419f75cb91ba7ed246302fb8
                                • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                • Opcode Fuzzy Hash: 3074b94dd0db5ede3fe92545a612de18a9a35f6e419f75cb91ba7ed246302fb8
                                • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                                APIs
                                • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                                • lstrlenW.KERNEL32(?), ref: 0041B207
                                • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                • _wcslen.LIBCMT ref: 0041B2DB
                                • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                • GetLastError.KERNEL32 ref: 0041B313
                                • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                • GetLastError.KERNEL32 ref: 0041B370
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                • String ID: ?
                                • API String ID: 3941738427-1684325040
                                • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                  • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,774D3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                  • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                  • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                • Sleep.KERNEL32(00000064), ref: 00412060
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                • String ID: /stext "$HDG$HDG$>G$>G
                                • API String ID: 1223786279-3931108886
                                • Opcode ID: cf142be46e054684403749ee3d900e93ccf570b5fe7ca0618ab2844ecc70b16a
                                • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                                • Opcode Fuzzy Hash: cf142be46e054684403749ee3d900e93ccf570b5fe7ca0618ab2844ecc70b16a
                                • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                                APIs
                                • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                                • GetCursorPos.USER32(?), ref: 0041CAF8
                                • SetForegroundWindow.USER32(?), ref: 0041CB01
                                • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                                • ExitProcess.KERNEL32 ref: 0041CB74
                                • CreatePopupMenu.USER32 ref: 0041CB7A
                                • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                • String ID: Close
                                • API String ID: 1657328048-3535843008
                                • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$Info
                                • String ID:
                                • API String ID: 2509303402-0
                                • Opcode ID: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                                • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                                • Opcode Fuzzy Hash: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                                • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                • __aulldiv.LIBCMT ref: 00407FE9
                                • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                • CloseHandle.KERNEL32(00000000), ref: 00408200
                                • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                • CloseHandle.KERNEL32(00000000), ref: 00408256
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                • API String ID: 1884690901-3066803209
                                • Opcode ID: 5c237be89f099d87d01b885cf0a422b96e171a015a81bb39f6c8daf5f6e0c82b
                                • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                                • Opcode Fuzzy Hash: 5c237be89f099d87d01b885cf0a422b96e171a015a81bb39f6c8daf5f6e0c82b
                                • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                                APIs
                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                • String ID: \ws2_32$\wship6$getaddrinfo
                                • API String ID: 2490988753-3078833738
                                • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                                • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                                APIs
                                • ___free_lconv_mon.LIBCMT ref: 004500B1
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                  • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                • _free.LIBCMT ref: 004500A6
                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                • _free.LIBCMT ref: 004500C8
                                • _free.LIBCMT ref: 004500DD
                                • _free.LIBCMT ref: 004500E8
                                • _free.LIBCMT ref: 0045010A
                                • _free.LIBCMT ref: 0045011D
                                • _free.LIBCMT ref: 0045012B
                                • _free.LIBCMT ref: 00450136
                                • _free.LIBCMT ref: 0045016E
                                • _free.LIBCMT ref: 00450175
                                • _free.LIBCMT ref: 00450192
                                • _free.LIBCMT ref: 004501AA
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                • String ID:
                                • API String ID: 161543041-0
                                • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                APIs
                                • __EH_prolog.LIBCMT ref: 0041912D
                                • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                • Sleep.KERNEL32(000003E8), ref: 0041926D
                                • GetLocalTime.KERNEL32(?), ref: 0041927C
                                • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                • API String ID: 489098229-65789007
                                • Opcode ID: d035b23978f635d26d413941e86b53147c054b16f8fc180901addfee223a089d
                                • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                • Opcode Fuzzy Hash: d035b23978f635d26d413941e86b53147c054b16f8fc180901addfee223a089d
                                • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                APIs
                                • connect.WS2_32(?,?,?), ref: 004042A5
                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                • API String ID: 994465650-2151626615
                                • Opcode ID: 60ac0c304c5624abd3eb0f5b990d7a2b8d442c90d38d14ed83455edc78695ec8
                                • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                • Opcode Fuzzy Hash: 60ac0c304c5624abd3eb0f5b990d7a2b8d442c90d38d14ed83455edc78695ec8
                                • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF
                                APIs
                                  • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                  • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                  • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                  • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                  • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                • ExitProcess.KERNEL32 ref: 0040C832
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                • API String ID: 1913171305-390638927
                                • Opcode ID: 5bb4c84d3517b3e85598af3c51efed398458d12967ae5ca6da544a86b0e32a83
                                • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                • Opcode Fuzzy Hash: 5bb4c84d3517b3e85598af3c51efed398458d12967ae5ca6da544a86b0e32a83
                                • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                                • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                                APIs
                                  • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                                • GetLastError.KERNEL32 ref: 00454A96
                                • __dosmaperr.LIBCMT ref: 00454A9D
                                • GetFileType.KERNEL32(00000000), ref: 00454AA9
                                • GetLastError.KERNEL32 ref: 00454AB3
                                • __dosmaperr.LIBCMT ref: 00454ABC
                                • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                                • CloseHandle.KERNEL32(?), ref: 00454C26
                                • GetLastError.KERNEL32 ref: 00454C58
                                • __dosmaperr.LIBCMT ref: 00454C5F
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                • String ID: H
                                • API String ID: 4237864984-2852464175
                                • Opcode ID: 43154248a50fd66e96ac6d70bada307b7577a7ac671062952f04f408382b00d8
                                • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                                • Opcode Fuzzy Hash: 43154248a50fd66e96ac6d70bada307b7577a7ac671062952f04f408382b00d8
                                • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 65535$udp
                                • API String ID: 0-1267037602
                                • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                APIs
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                • String ID: <$@$@FG$@FG$TUF$Temp
                                • API String ID: 1107811701-4124992407
                                • Opcode ID: 752ca13c782d44821a1ec6be30a7add5be14379de4efd94ca99b1656ba8a68f0
                                • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                                • Opcode Fuzzy Hash: 752ca13c782d44821a1ec6be30a7add5be14379de4efd94ca99b1656ba8a68f0
                                • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                APIs
                                • SetEvent.KERNEL32(?,?), ref: 00404E71
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                • TranslateMessage.USER32(?), ref: 00404F30
                                • DispatchMessageA.USER32(?), ref: 00404F3B
                                • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                • String ID: CloseChat$DisplayMessage$GetMessage
                                • API String ID: 2956720200-749203953
                                • Opcode ID: 6851d8bc7bf9016432c8dd1ee5dfa17afbba82a66fcbd05ea9eb0e3666f7b41f
                                • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                                • Opcode Fuzzy Hash: 6851d8bc7bf9016432c8dd1ee5dfa17afbba82a66fcbd05ea9eb0e3666f7b41f
                                • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                                APIs
                                • GetCurrentProcess.KERNEL32(00474A28,00000000,?,00003000,00000004,00000000,00000001), ref: 00406647
                                • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe), ref: 00406705
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentProcess
                                • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$pUF$windir
                                • API String ID: 2050909247-943210432
                                • Opcode ID: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                                • Opcode Fuzzy Hash: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                                • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: 83979f30ba13052199b290374f4e897ff0c223aa30bace9cb26b013bf86a6d8f
                                • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                                • Opcode Fuzzy Hash: 83979f30ba13052199b290374f4e897ff0c223aa30bace9cb26b013bf86a6d8f
                                • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                                APIs
                                • _free.LIBCMT ref: 00446DDF
                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                • _free.LIBCMT ref: 00446DEB
                                • _free.LIBCMT ref: 00446DF6
                                • _free.LIBCMT ref: 00446E01
                                • _free.LIBCMT ref: 00446E0C
                                • _free.LIBCMT ref: 00446E17
                                • _free.LIBCMT ref: 00446E22
                                • _free.LIBCMT ref: 00446E2D
                                • _free.LIBCMT ref: 00446E38
                                • _free.LIBCMT ref: 00446E46
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                                • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                                APIs
                                • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041B846
                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041B88A
                                • RegCloseKey.ADVAPI32(?), ref: 0041BB54
                                Strings
                                • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0041B83C
                                • DisplayName, xrefs: 0041B8D1
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnumOpen
                                • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                • API String ID: 1332880857-3614651759
                                • Opcode ID: beee8cc8128c5b6292a52baa65063b935d7e49e28abb99bedb81eb58e8c596e1
                                • Instruction ID: 4ca6cd9db44c7b11bab16217f2b7ba144dfc64e74838f3250c32f9e768a6938f
                                • Opcode Fuzzy Hash: beee8cc8128c5b6292a52baa65063b935d7e49e28abb99bedb81eb58e8c596e1
                                • Instruction Fuzzy Hash: 8C812E311082449BD324EB11DC51AEFB7E9FFD4314F10493FB58A921E1EF74AA49CA9A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Eventinet_ntoa
                                • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                • API String ID: 3578746661-4192532303
                                • Opcode ID: 4163f75ab31c217dce1913ce5138b440b1e299498f28ffcc65a8f219bab15211
                                • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                • Opcode Fuzzy Hash: 4163f75ab31c217dce1913ce5138b440b1e299498f28ffcc65a8f219bab15211
                                • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                  • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                • Sleep.KERNEL32(00000064), ref: 00416688
                                • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CreateDeleteExecuteShellSleep
                                • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                • API String ID: 1462127192-2001430897
                                • Opcode ID: 62ca92dac7a2b5d4b18e3dc3447172731693f9ef9de150acbe00dd0aa8aa71c1
                                • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                • Opcode Fuzzy Hash: 62ca92dac7a2b5d4b18e3dc3447172731693f9ef9de150acbe00dd0aa8aa71c1
                                • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                APIs
                                • _strftime.LIBCMT ref: 00401AD3
                                  • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                • API String ID: 3809562944-3643129801
                                • Opcode ID: b8eed0d151ccb6e5a82338ef45dd5c7a6e48c5c8e1108a83b815f9cf038dc0a3
                                • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                • Opcode Fuzzy Hash: b8eed0d151ccb6e5a82338ef45dd5c7a6e48c5c8e1108a83b815f9cf038dc0a3
                                • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                APIs
                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                • waveInStart.WINMM ref: 00401A81
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                • String ID: XCG$`=G$x=G
                                • API String ID: 1356121797-903574159
                                • Opcode ID: df66b5dce40286873da021395106849cc9c08a1aee5ad096444ea0181d895aab
                                • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                • Opcode Fuzzy Hash: df66b5dce40286873da021395106849cc9c08a1aee5ad096444ea0181d895aab
                                • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                  • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                  • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                  • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                                • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                                • TranslateMessage.USER32(?), ref: 0041C9FB
                                • DispatchMessageA.USER32(?), ref: 0041CA05
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                • String ID: Remcos
                                • API String ID: 1970332568-165870891
                                • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b03e61c4093a21660133e67fc3f0c2c165a648bd703d9864a2b1dbb5c11dd296
                                • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                • Opcode Fuzzy Hash: b03e61c4093a21660133e67fc3f0c2c165a648bd703d9864a2b1dbb5c11dd296
                                • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                APIs
                                • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00452E03,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452BD6
                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452C59
                                • __alloca_probe_16.LIBCMT ref: 00452C91
                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00452E03,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452CEC
                                • __alloca_probe_16.LIBCMT ref: 00452D3B
                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D03
                                  • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D7F
                                • __freea.LIBCMT ref: 00452DAA
                                • __freea.LIBCMT ref: 00452DB6
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                • String ID:
                                • API String ID: 201697637-0
                                • Opcode ID: 33853d2748869a5bbf0e5c11ad0ba2693683b8c54e761c696d343b85774101d6
                                • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                • Opcode Fuzzy Hash: 33853d2748869a5bbf0e5c11ad0ba2693683b8c54e761c696d343b85774101d6
                                • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • _memcmp.LIBVCRUNTIME ref: 004446A3
                                • _free.LIBCMT ref: 00444714
                                • _free.LIBCMT ref: 0044472D
                                • _free.LIBCMT ref: 0044475F
                                • _free.LIBCMT ref: 00444768
                                • _free.LIBCMT ref: 00444774
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorLast$_abort_memcmp
                                • String ID: C
                                • API String ID: 1679612858-1037565863
                                • Opcode ID: 4ee3c7c2bc2adc8e7b8f5f7d65043758b13cb49f9f14cb5bf46d27c87fe2b158
                                • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                • Opcode Fuzzy Hash: 4ee3c7c2bc2adc8e7b8f5f7d65043758b13cb49f9f14cb5bf46d27c87fe2b158
                                • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: tcp$udp
                                • API String ID: 0-3725065008
                                • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                APIs
                                • ExitThread.KERNEL32 ref: 004017F4
                                  • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                  • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                  • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                • __Init_thread_footer.LIBCMT ref: 004017BC
                                  • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                  • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                • String ID: T=G$p[G$>G$>G
                                • API String ID: 1596592924-2461731529
                                • Opcode ID: aeffae19d62247b8119facb1c46e767f29e703cc469e99725dcad57df9802044
                                • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                • Opcode Fuzzy Hash: aeffae19d62247b8119facb1c46e767f29e703cc469e99725dcad57df9802044
                                • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                APIs
                                • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                  • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                  • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnumInfoOpenQuerysend
                                • String ID: TUF$TUFTUF$>G$DG$DG
                                • API String ID: 3114080316-72097156
                                • Opcode ID: 103aaf01797a1ebbf1e62c891f2288938d38a9adcecb4949bddfb57d7650f9a4
                                • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                                • Opcode Fuzzy Hash: 103aaf01797a1ebbf1e62c891f2288938d38a9adcecb4949bddfb57d7650f9a4
                                • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                APIs
                                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                  • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                  • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                • String ID: .part
                                • API String ID: 1303771098-3499674018
                                • Opcode ID: 124c633532e8600691c4108089ff1e2e84c33ce980c006a8ee94900b53e6ed61
                                • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                • Opcode Fuzzy Hash: 124c633532e8600691c4108089ff1e2e84c33ce980c006a8ee94900b53e6ed61
                                • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                APIs
                                  • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                  • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                  • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                  • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                  • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                • _wcslen.LIBCMT ref: 0041A8F6
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                • API String ID: 3286818993-703403762
                                • Opcode ID: d31394a1e59778cac49212debd323097d31c222899c914d30ad8a284f22ebc6c
                                • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                                • Opcode Fuzzy Hash: d31394a1e59778cac49212debd323097d31c222899c914d30ad8a284f22ebc6c
                                • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                                APIs
                                  • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                  • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                  • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders$TUF
                                • API String ID: 1133728706-1738023494
                                • Opcode ID: b37d7cdf558f6179467cfee4591f26066e84925d5771a5902107678b3115d486
                                • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                • Opcode Fuzzy Hash: b37d7cdf558f6179467cfee4591f26066e84925d5771a5902107678b3115d486
                                • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                APIs
                                • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                                • GetConsoleWindow.KERNEL32 ref: 0041BEBF
                                • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                                • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Console$Window$AllocOutputShow
                                • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                • API String ID: 4067487056-2527699604
                                • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                                • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043D564,0043D564,?,?,?,00449BA1,00000001,00000001,1AE85006), ref: 004499AA
                                • __alloca_probe_16.LIBCMT ref: 004499E2
                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00449BA1,00000001,00000001,1AE85006,?,?,?), ref: 00449A30
                                • __alloca_probe_16.LIBCMT ref: 00449AC7
                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                • __freea.LIBCMT ref: 00449B37
                                  • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                • __freea.LIBCMT ref: 00449B40
                                • __freea.LIBCMT ref: 00449B65
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                • String ID:
                                • API String ID: 3864826663-0
                                • Opcode ID: 352025556551dac2c37919268567461b7de28f4f732b96d5dc4c3903fd0b0184
                                • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                • Opcode Fuzzy Hash: 352025556551dac2c37919268567461b7de28f4f732b96d5dc4c3903fd0b0184
                                • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                APIs
                                • SendInput.USER32 ref: 00418B08
                                • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                                • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                  • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: InputSend$Virtual
                                • String ID:
                                • API String ID: 1167301434-0
                                • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                                • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                                APIs
                                • OpenClipboard.USER32 ref: 00415A46
                                • EmptyClipboard.USER32 ref: 00415A54
                                • CloseClipboard.USER32 ref: 00415A5A
                                • OpenClipboard.USER32 ref: 00415A61
                                • GetClipboardData.USER32(0000000D), ref: 00415A71
                                • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                • CloseClipboard.USER32 ref: 00415A89
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                • String ID:
                                • API String ID: 2172192267-0
                                • Opcode ID: ff49c4b619c8d0a2384b32b470fc1757cf84f728bd461dae53594b1cdfbb7d30
                                • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                                • Opcode Fuzzy Hash: ff49c4b619c8d0a2384b32b470fc1757cf84f728bd461dae53594b1cdfbb7d30
                                • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                                APIs
                                • _free.LIBCMT ref: 00447EBC
                                • _free.LIBCMT ref: 00447EE0
                                • _free.LIBCMT ref: 00448067
                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                                • _free.LIBCMT ref: 00448233
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                • String ID:
                                • API String ID: 314583886-0
                                • Opcode ID: 4d66406e984c604246852defaa851237a19ea919a7a16fb56f132950f37b46de
                                • Instruction ID: d74e55ca02e924b9256a88f94e7be2aa31ce1fd8fbfcff02d88bcfbefc6cbd9d
                                • Opcode Fuzzy Hash: 4d66406e984c604246852defaa851237a19ea919a7a16fb56f132950f37b46de
                                • Instruction Fuzzy Hash: 32C12871904205ABFB24DF799C41AAE7BB8EF46314F2441AFE484A7351EB388E47C758
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                                • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                • Opcode Fuzzy Hash: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                                • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                APIs
                                  • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                • _free.LIBCMT ref: 00444086
                                • _free.LIBCMT ref: 0044409D
                                • _free.LIBCMT ref: 004440BC
                                • _free.LIBCMT ref: 004440D7
                                • _free.LIBCMT ref: 004440EE
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$AllocateHeap
                                • String ID: J7D
                                • API String ID: 3033488037-1677391033
                                • Opcode ID: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                                • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                                • Opcode Fuzzy Hash: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                                • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                                APIs
                                • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                                • __fassign.LIBCMT ref: 0044A180
                                • __fassign.LIBCMT ref: 0044A19B
                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                                • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                • String ID:
                                • API String ID: 1324828854-0
                                • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: HE$HE
                                • API String ID: 269201875-1978648262
                                • Opcode ID: fc29a47a32afb3350fc3e3c96543f328580f9b5143c0f3ce58bfce5294a38304
                                • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                • Opcode Fuzzy Hash: fc29a47a32afb3350fc3e3c96543f328580f9b5143c0f3ce58bfce5294a38304
                                • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                APIs
                                  • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                  • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                  • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                  • Part of subcall function 0041B187: IsWow64Process.KERNEL32(00000000,?,?,?,00474358), ref: 0041B1A7
                                  • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                  • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                • String ID: PgF
                                • API String ID: 2180151492-654241383
                                • Opcode ID: e70769d42ffb53cdc90a18aa5a86959c2d774f9c0fce08565d8f7a58d3c92881
                                • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                • Opcode Fuzzy Hash: e70769d42ffb53cdc90a18aa5a86959c2d774f9c0fce08565d8f7a58d3c92881
                                • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                APIs
                                • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                • _ValidateLocalCookies.LIBCMT ref: 00437B41
                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                • String ID: csm
                                • API String ID: 1170836740-1018135373
                                • Opcode ID: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                • Opcode Fuzzy Hash: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ac8429af2de8aec4c7be5426e4bb47fdde12a831901fd5511e93482c0d59407e
                                • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                • Opcode Fuzzy Hash: ac8429af2de8aec4c7be5426e4bb47fdde12a831901fd5511e93482c0d59407e
                                • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                • int.LIBCPMT ref: 0040FC0F
                                  • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                  • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                • String ID: P[G
                                • API String ID: 2536120697-571123470
                                • Opcode ID: 080c8d6f573d4b518caf4e655f0fcc3a1f7fca7e624085fd0a478c15266a48d0
                                • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                                • Opcode Fuzzy Hash: 080c8d6f573d4b518caf4e655f0fcc3a1f7fca7e624085fd0a478c15266a48d0
                                • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                                APIs
                                • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                                • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                                • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                                Strings
                                • http://geoplugin.net/json.gp, xrefs: 0041A54E
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileRead
                                • String ID: http://geoplugin.net/json.gp
                                • API String ID: 3121278467-91888290
                                • Opcode ID: 73d5a9f361857d3556796ecfeaec69cbc43bb770c50fe8700ae67d2cee389403
                                • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                • Opcode Fuzzy Hash: 73d5a9f361857d3556796ecfeaec69cbc43bb770c50fe8700ae67d2cee389403
                                • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                                APIs
                                  • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                                • _free.LIBCMT ref: 0044FD29
                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                • _free.LIBCMT ref: 0044FD34
                                • _free.LIBCMT ref: 0044FD3F
                                • _free.LIBCMT ref: 0044FD93
                                • _free.LIBCMT ref: 0044FD9E
                                • _free.LIBCMT ref: 0044FDA9
                                • _free.LIBCMT ref: 0044FDB4
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                                • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                                APIs
                                • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe), ref: 00406835
                                  • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                  • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                • CoUninitialize.OLE32 ref: 0040688E
                                Strings
                                • C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, xrefs: 00406815, 00406818, 0040686A
                                • [+] before ShellExec, xrefs: 00406856
                                • [+] ShellExec success, xrefs: 00406873
                                • [+] ucmCMLuaUtilShellExecMethod, xrefs: 0040681A
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: InitializeObjectUninitialize_wcslen
                                • String ID: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                • API String ID: 3851391207-2810978530
                                • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                • int.LIBCPMT ref: 0040FEF2
                                  • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                  • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                • String ID: H]G
                                • API String ID: 2536120697-1717957184
                                • Opcode ID: 4f42b0104d3fab8d9c54d588918312ac25f5cdf33bdc383dd9a32706d08bdfcf
                                • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                                • Opcode Fuzzy Hash: 4f42b0104d3fab8d9c54d588918312ac25f5cdf33bdc383dd9a32706d08bdfcf
                                • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                                APIs
                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                • GetLastError.KERNEL32 ref: 0040B2EE
                                Strings
                                • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                • UserProfile, xrefs: 0040B2B4
                                • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                • [Chrome Cookies not found], xrefs: 0040B308
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteErrorFileLast
                                • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                • API String ID: 2018770650-304995407
                                • Opcode ID: affce56bb21929d7383bdb2dccb574c79b51b4180e8c74c87d019dc2b0b7a2d9
                                • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                                • Opcode Fuzzy Hash: affce56bb21929d7383bdb2dccb574c79b51b4180e8c74c87d019dc2b0b7a2d9
                                • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                                Strings
                                • Rmc-L31JDJ, xrefs: 0040693F
                                • C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe, xrefs: 00406927
                                • h5], xrefs: 00406909
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe$Rmc-L31JDJ$h5]
                                • API String ID: 0-3183723033
                                • Opcode ID: d50a95e135f0bfdaf236d1bb78b8391e43d4b57b805b0d92c2bf5032378cfc05
                                • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                • Opcode Fuzzy Hash: d50a95e135f0bfdaf236d1bb78b8391e43d4b57b805b0d92c2bf5032378cfc05
                                • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                APIs
                                • _free.LIBCMT ref: 00443305
                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                • _free.LIBCMT ref: 00443317
                                • _free.LIBCMT ref: 0044332A
                                • _free.LIBCMT ref: 0044333B
                                • _free.LIBCMT ref: 0044334C
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID: M]
                                • API String ID: 776569668-3023866013
                                • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                APIs
                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                                • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                                • Sleep.KERNEL32(00002710), ref: 00419F79
                                • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: PlaySound$HandleLocalModuleSleepTime
                                • String ID: Alarm triggered$`Mw
                                • API String ID: 614609389-968373943
                                • Opcode ID: debb84a1251a9d4f253e7d3f2da0eb81be5ea948ed7eff08d43fd7d9de811cd2
                                • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                                • Opcode Fuzzy Hash: debb84a1251a9d4f253e7d3f2da0eb81be5ea948ed7eff08d43fd7d9de811cd2
                                • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                                APIs
                                • __allrem.LIBCMT ref: 00439789
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                • __allrem.LIBCMT ref: 004397BC
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                • __allrem.LIBCMT ref: 004397F1
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                • String ID:
                                • API String ID: 1992179935-0
                                • Opcode ID: 088a2e1066119da7e611ebb0c50ba568729b81e5e50e163a33f94ab824c18df8
                                • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                • Opcode Fuzzy Hash: 088a2e1066119da7e611ebb0c50ba568729b81e5e50e163a33f94ab824c18df8
                                • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: __cftoe
                                • String ID:
                                • API String ID: 4189289331-0
                                • Opcode ID: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                                • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                • Opcode Fuzzy Hash: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                                • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: __freea$__alloca_probe_16
                                • String ID: a/p$am/pm
                                • API String ID: 3509577899-3206640213
                                • Opcode ID: d47145a3bc1b7d9653af932916ed6ede224238620767b4a39004040ccf91a16a
                                • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                • Opcode Fuzzy Hash: d47145a3bc1b7d9653af932916ed6ede224238620767b4a39004040ccf91a16a
                                • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                APIs
                                • Sleep.KERNEL32(00000000), ref: 00403E8A
                                  • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: H_prologSleep
                                • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                                • API String ID: 3469354165-462540288
                                • Opcode ID: 19545d8258593a34bbc03ad769790f0fc6e97636190532ee7c72a370af199233
                                • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                                • Opcode Fuzzy Hash: 19545d8258593a34bbc03ad769790f0fc6e97636190532ee7c72a370af199233
                                • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                                • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                                • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                                • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                                • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                • String ID:
                                • API String ID: 493672254-0
                                • Opcode ID: 8d0c32570e89dd068500cd90fe1776a703b3a192111dc2e8c1051611ff5d3692
                                • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                                • Opcode Fuzzy Hash: 8d0c32570e89dd068500cd90fe1776a703b3a192111dc2e8c1051611ff5d3692
                                • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                                APIs
                                • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                                • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastValue___vcrt_
                                • String ID:
                                • API String ID: 3852720340-0
                                • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                                • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                                APIs
                                • GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                • _free.LIBCMT ref: 00446EF6
                                • _free.LIBCMT ref: 00446F1E
                                • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                • _abort.LIBCMT ref: 00446F3D
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free$_abort
                                • String ID:
                                • API String ID: 3160817290-0
                                • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                                • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: e0442b8656df40b354effc29a53afdc585f42babe91f9aeac9dec78915b16ffb
                                • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                                • Opcode Fuzzy Hash: e0442b8656df40b354effc29a53afdc585f42babe91f9aeac9dec78915b16ffb
                                • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                                • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: 197637b26bbdd00f03ff7db36be43807083bab4a770c68d4e23c4aa016e90e1f
                                • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                                • Opcode Fuzzy Hash: 197637b26bbdd00f03ff7db36be43807083bab4a770c68d4e23c4aa016e90e1f
                                • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                                • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: e355818817006b765bc9d302ee5cf97eebc986756fff16413e45bff3808d062c
                                • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                                • Opcode Fuzzy Hash: e355818817006b765bc9d302ee5cf97eebc986756fff16413e45bff3808d062c
                                • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                                APIs
                                • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Enum$InfoQueryValue
                                • String ID: [regsplt]$DG
                                • API String ID: 3554306468-1089238109
                                • Opcode ID: 0bdfa4b9751d6e045e73703d7cb58597d516aa462230dbbc1e67517898b41e87
                                • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                • Opcode Fuzzy Hash: 0bdfa4b9751d6e045e73703d7cb58597d516aa462230dbbc1e67517898b41e87
                                • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe,00000104), ref: 00442714
                                • _free.LIBCMT ref: 004427DF
                                • _free.LIBCMT ref: 004427E9
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$FileModuleName
                                • String ID: '\$C:\Users\user\Desktop\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe
                                • API String ID: 2506810119-836470233
                                • Opcode ID: 517ef8501d39ed80bd5d3989cd54e6cd38b7eb486680de81052e85c6479d25b4
                                • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                • Opcode Fuzzy Hash: 517ef8501d39ed80bd5d3989cd54e6cd38b7eb486680de81052e85c6479d25b4
                                • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                APIs
                                  • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                  • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                  • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                  • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                  • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                                • API String ID: 2974294136-753205382
                                • Opcode ID: 84d5120d1790242da64ed9a6eb1f5c34e2201cb21d83ae33a80d74a94cbf0ed8
                                • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                                • Opcode Fuzzy Hash: 84d5120d1790242da64ed9a6eb1f5c34e2201cb21d83ae33a80d74a94cbf0ed8
                                • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: h ]
                                • API String ID: 0-970672737
                                • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                                • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                                APIs
                                • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                                • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                                • __dosmaperr.LIBCMT ref: 0044AAFE
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseErrorHandleLast__dosmaperr
                                • String ID: x^$`@
                                • API String ID: 2583163307-167888777
                                • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                                • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                                APIs
                                • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                • GetLastError.KERNEL32 ref: 0041CA91
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ClassCreateErrorLastRegisterWindow
                                • String ID: 0$MsgWindowClass
                                • API String ID: 2877667751-2410386613
                                • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                APIs
                                • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                • CloseHandle.KERNEL32(?), ref: 00406A0F
                                • CloseHandle.KERNEL32(?), ref: 00406A14
                                Strings
                                • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandle$CreateProcess
                                • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                • API String ID: 2922976086-4183131282
                                • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                                • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                                APIs
                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002), ref: 004425F9
                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 0044262F
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressFreeHandleLibraryModuleProc
                                • String ID: CorExitProcess$mscoree.dll
                                • API String ID: 4061214504-1276376045
                                • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                APIs
                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00475B70,0040483F,00000001,?,?,00000000,00475B70,004017F3), ref: 00404AED
                                • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404AF9
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404B04
                                • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404B0D
                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                • String ID: KeepAlive | Disabled
                                • API String ID: 2993684571-305739064
                                • Opcode ID: 1c0c748ad9fecb0dd528124c77293d7db353f6adbd4e84571b4901e68838a0a9
                                • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                • Opcode Fuzzy Hash: 1c0c748ad9fecb0dd528124c77293d7db353f6adbd4e84571b4901e68838a0a9
                                • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                APIs
                                • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                                • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                                • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                                • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                                Strings
                                • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Console$AttributeText$BufferHandleInfoScreen
                                • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                • API String ID: 3024135584-2418719853
                                • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5145828a6066f50cf31ff859ee0e23af4d85e603a01b225214a849b1d7000abc
                                • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                • Opcode Fuzzy Hash: 5145828a6066f50cf31ff859ee0e23af4d85e603a01b225214a849b1d7000abc
                                • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                APIs
                                  • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                • String ID:
                                • API String ID: 3525466593-0
                                • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043E3ED,?,00000000,?,00000001,?,?,00000001,0043E3ED,?), ref: 0044FF20
                                • __alloca_probe_16.LIBCMT ref: 0044FF58
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044FFA9
                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,004399BF,?), ref: 0044FFBB
                                • __freea.LIBCMT ref: 0044FFC4
                                  • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                • String ID:
                                • API String ID: 313313983-0
                                • Opcode ID: f170efb2dc1c6de9df76393386ebf7cd534c4364e4366eebd744cf228c8edce4
                                • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                                • Opcode Fuzzy Hash: f170efb2dc1c6de9df76393386ebf7cd534c4364e4366eebd744cf228c8edce4
                                • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                                APIs
                                • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                  • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                • _free.LIBCMT ref: 0044E1A0
                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                • String ID:
                                • API String ID: 336800556-0
                                • Opcode ID: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                                • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                • Opcode Fuzzy Hash: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                                • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                APIs
                                • GetLastError.KERNEL32(0000000A,0000000B,0000000A,00445359,00440A9B,00000000,?,?,?,?,00440C7E,00000000,0000000A,000000FF,0000000A,00000000), ref: 00446F48
                                • _free.LIBCMT ref: 00446F7D
                                • _free.LIBCMT ref: 00446FA4
                                • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 00446FB1
                                • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 00446FBA
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free
                                • String ID:
                                • API String ID: 3170660625-0
                                • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                                • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                                APIs
                                • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041B3C8
                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseHandleOpen$FileImageName
                                • String ID:
                                • API String ID: 2951400881-0
                                • Opcode ID: db4a41822c85b6549257f18fa46790b7e5e5d5e6a524df97c50e7420b53bdc77
                                • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                • Opcode Fuzzy Hash: db4a41822c85b6549257f18fa46790b7e5e5d5e6a524df97c50e7420b53bdc77
                                • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                APIs
                                • _free.LIBCMT ref: 0044F7B5
                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                • _free.LIBCMT ref: 0044F7C7
                                • _free.LIBCMT ref: 0044F7D9
                                • _free.LIBCMT ref: 0044F7EB
                                • _free.LIBCMT ref: 0044F7FD
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                APIs
                                • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                • IsWindowVisible.USER32(?), ref: 004167A1
                                  • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                  • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessWindow$Open$TextThreadVisible
                                • String ID: (FG
                                • API String ID: 3142014140-2273637114
                                • Opcode ID: 92bcab0c5e250d577a7545fc527d6642a8e7c755569237cd88e9487c31cb9e3a
                                • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                • Opcode Fuzzy Hash: 92bcab0c5e250d577a7545fc527d6642a8e7c755569237cd88e9487c31cb9e3a
                                • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                APIs
                                • _strpbrk.LIBCMT ref: 0044D4A8
                                • _free.LIBCMT ref: 0044D5C5
                                  • Part of subcall function 0043A854: IsProcessorFeaturePresent.KERNEL32(00000017,0043A826,00000000,0000000A,0000000A,00000000,0041AD67,00000022,?,?,0043A833,00000000,00000000,00000000,00000000,00000000), ref: 0043A856
                                  • Part of subcall function 0043A854: GetCurrentProcess.KERNEL32(C0000417,0000000A,00000000), ref: 0043A878
                                  • Part of subcall function 0043A854: TerminateProcess.KERNEL32(00000000), ref: 0043A87F
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                • String ID: *?$.
                                • API String ID: 2812119850-3972193922
                                • Opcode ID: 3ccd6c7c6263025d80bbf4df8e19646480fb990c35b4b1cfbff97afb24dbcef1
                                • Instruction ID: 2d4433a3afc190a5690657b280c6536bac4d5ba0d1806d6c31be7b1549e3be36
                                • Opcode Fuzzy Hash: 3ccd6c7c6263025d80bbf4df8e19646480fb990c35b4b1cfbff97afb24dbcef1
                                • Instruction Fuzzy Hash: 7251B371E00109AFEF14DFA9C881AAEB7F5EF58318F24416FE854E7301DA799E018B54
                                APIs
                                • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                  • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                  • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                  • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                  • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                • String ID: XCG$`AG$>G
                                • API String ID: 2334542088-2372832151
                                • Opcode ID: 01d87438e36237900ce3fcf4a0fcd8e5603590acb279c46314cb3d03d2aeb844
                                • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                • Opcode Fuzzy Hash: 01d87438e36237900ce3fcf4a0fcd8e5603590acb279c46314cb3d03d2aeb844
                                • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                  • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,774D3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                  • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                  • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                  • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                • String ID: /sort "Visit Time" /stext "$8>G
                                • API String ID: 368326130-2663660666
                                • Opcode ID: da2f10cea95d2592b17b99b67cdaa5e157d5c6ca5e27cf500eeafe48e184eaae
                                • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                • Opcode Fuzzy Hash: da2f10cea95d2592b17b99b67cdaa5e157d5c6ca5e27cf500eeafe48e184eaae
                                • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                  • Part of subcall function 0044DDE7: _abort.LIBCMT ref: 0044DE19
                                  • Part of subcall function 0044DDE7: _free.LIBCMT ref: 0044DE4D
                                  • Part of subcall function 0044DA5C: GetOEMCP.KERNEL32(00000000,?,?,0044DCE5,?), ref: 0044DA87
                                • _free.LIBCMT ref: 0044DD40
                                • _free.LIBCMT ref: 0044DD76
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorLast_abort
                                • String ID: M]$M]
                                • API String ID: 2991157371-119895576
                                • Opcode ID: 9ec75d27e75173005142ff49c1fb8a194fa534556bd27181e1428d408c7a2cd6
                                • Instruction ID: 78e98af2e08dba5698695eadbe882f177ccac690bbf417dcf661007a8bbce0b0
                                • Opcode Fuzzy Hash: 9ec75d27e75173005142ff49c1fb8a194fa534556bd27181e1428d408c7a2cd6
                                • Instruction Fuzzy Hash: CE31E4B1D04108AFFB14EF69D441B9A77F4DF41324F25409FE9049B2A2EB799D41CB58
                                APIs
                                • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                • wsprintfW.USER32 ref: 0040A905
                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: EventLocalTimewsprintf
                                • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                • API String ID: 1497725170-1359877963
                                • Opcode ID: ba7ddda832803808cbfe6e4fced7d86aab764d3b23e4f9a5d1baf008580cd9ea
                                • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                                • Opcode Fuzzy Hash: ba7ddda832803808cbfe6e4fced7d86aab764d3b23e4f9a5d1baf008580cd9ea
                                • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                                APIs
                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread$LocalTime$wsprintf
                                • String ID: Online Keylogger Started
                                • API String ID: 112202259-1258561607
                                • Opcode ID: 74bbf1dd48c5cc06e207f48c4eb53604144d0a493703acba44df512efce14c16
                                • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                                • Opcode Fuzzy Hash: 74bbf1dd48c5cc06e207f48c4eb53604144d0a493703acba44df512efce14c16
                                • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                APIs
                                • GetLocalTime.KERNEL32(?), ref: 00404946
                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                                • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                Strings
                                • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Create$EventLocalThreadTime
                                • String ID: KeepAlive | Enabled | Timeout:
                                • API String ID: 2532271599-1507639952
                                • Opcode ID: 35453c4289c9b9740e7d5fc02d345a9090b78ad88d17a20c74762e0b12e92854
                                • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                • Opcode Fuzzy Hash: 35453c4289c9b9740e7d5fc02d345a9090b78ad88d17a20c74762e0b12e92854
                                • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: TUF$alarm.wav$xIG
                                • API String ID: 1174141254-2188790166
                                • Opcode ID: d2369e0a6d0f450e44d70bf7e035cc7ec18e321b0156b61c76764052e4438120
                                • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                                • Opcode Fuzzy Hash: d2369e0a6d0f450e44d70bf7e035cc7ec18e321b0156b61c76764052e4438120
                                • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEventHandleObjectSingleWait
                                • String ID: Connection Timeout
                                • API String ID: 2055531096-499159329
                                • Opcode ID: 021faa9111ab8834074a9e6104490ab3bec6bd23ae7819230539afb67bbeabe2
                                • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                                • Opcode Fuzzy Hash: 021faa9111ab8834074a9e6104490ab3bec6bd23ae7819230539afb67bbeabe2
                                • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                                APIs
                                • RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 0041277F
                                • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,h5]), ref: 004127AD
                                • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,h5]), ref: 004127B8
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID: pth_unenc
                                • API String ID: 1818849710-4028850238
                                • Opcode ID: 2b0b83c385fe9b11323970af50dff3bb0d924dce91bf1d9d78cbef32cf6cf5ea
                                • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                • Opcode Fuzzy Hash: 2b0b83c385fe9b11323970af50dff3bb0d924dce91bf1d9d78cbef32cf6cf5ea
                                • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                  • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                  • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                • String ID: bad locale name
                                • API String ID: 3628047217-1405518554
                                • Opcode ID: 2c952230bb5508a40ba9b400b3509c8dd800ec2376424fb743b9d3d13ecaa97f
                                • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                                • Opcode Fuzzy Hash: 2c952230bb5508a40ba9b400b3509c8dd800ec2376424fb743b9d3d13ecaa97f
                                • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteShell
                                • String ID: /C $cmd.exe$open
                                • API String ID: 587946157-3896048727
                                • Opcode ID: ee6d09c7a5be61fc2c77f0fe381f15b1933766d643093560b744fac4f5f657b7
                                • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                • Opcode Fuzzy Hash: ee6d09c7a5be61fc2c77f0fe381f15b1933766d643093560b744fac4f5f657b7
                                • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                APIs
                                • TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,h5],004742F8,?,pth_unenc), ref: 0040AFC9
                                • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                • TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: TerminateThread$HookUnhookWindows
                                • String ID: pth_unenc
                                • API String ID: 3123878439-4028850238
                                • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: __alldvrm$_strrchr
                                • String ID:
                                • API String ID: 1036877536-0
                                • Opcode ID: 63f75d4c6ddf9dfadee5a9a28b1451e266bcc439c32975fae3941ae33d1a5297
                                • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                                • Opcode Fuzzy Hash: 63f75d4c6ddf9dfadee5a9a28b1451e266bcc439c32975fae3941ae33d1a5297
                                • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d2c3ac181d975cfacaee5c3ec40136b8bdf5b2422b9dd14ab5655829a2308330
                                • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                • Opcode Fuzzy Hash: d2c3ac181d975cfacaee5c3ec40136b8bdf5b2422b9dd14ab5655829a2308330
                                • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                APIs
                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                • String ID:
                                • API String ID: 3360349984-0
                                • Opcode ID: 687cc25b70590890ee4835b3ee453ca5d573141b8347a1c076274b7774bdc746
                                • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                • Opcode Fuzzy Hash: 687cc25b70590890ee4835b3ee453ca5d573141b8347a1c076274b7774bdc746
                                • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                APIs
                                Strings
                                • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep
                                • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                • API String ID: 3472027048-1236744412
                                • Opcode ID: a28c998271a66f8567227a1897484aa15a4fe563e622933235ba73a641e0d975
                                • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                                • Opcode Fuzzy Hash: a28c998271a66f8567227a1897484aa15a4fe563e622933235ba73a641e0d975
                                • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                                APIs
                                  • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                  • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                  • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQuerySleepValue
                                • String ID: @CG$exepath$h5]
                                • API String ID: 4119054056-1338969773
                                • Opcode ID: fd72609be73d1f1783dbf1d279e952d5808c6a47d3307a1485aff8893a4aba73
                                • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                • Opcode Fuzzy Hash: fd72609be73d1f1783dbf1d279e952d5808c6a47d3307a1485aff8893a4aba73
                                • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: SystemTimes$Sleep__aulldiv
                                • String ID:
                                • API String ID: 188215759-0
                                • Opcode ID: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                                • Instruction ID: 3b66203fd79088dfadce72ddbf0b0401c54eb4bd27628439374ba0e7aa9136f0
                                • Opcode Fuzzy Hash: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                                • Instruction Fuzzy Hash: 9D215E725083009BC304DF65D98589FB7E8EFC8654F044A2EF589D3251EA34EA49CB63
                                APIs
                                  • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                  • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                  • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                                • Sleep.KERNEL32(000001F4), ref: 00409C95
                                • Sleep.KERNEL32(00000064), ref: 00409D1F
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$SleepText$ForegroundLength
                                • String ID: [ $ ]
                                • API String ID: 3309952895-93608704
                                • Opcode ID: 92cb9d2a2d6bf6289d44fec474a7e000b4a54ab88b054bee990bed59a71b9a03
                                • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                                • Opcode Fuzzy Hash: 92cb9d2a2d6bf6289d44fec474a7e000b4a54ab88b054bee990bed59a71b9a03
                                • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                                • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                                APIs
                                • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                  • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                  • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                • _UnwindNestedFrames.LIBCMT ref: 00438124
                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                • String ID:
                                • API String ID: 737400349-0
                                • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                APIs
                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                • GetLastError.KERNEL32(?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LibraryLoad$ErrorLast
                                • String ID:
                                • API String ID: 3177248105-0
                                • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B647
                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B66C
                                • CloseHandle.KERNEL32(00000000), ref: 0041B67A
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleReadSize
                                • String ID:
                                • API String ID: 3919263394-0
                                • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                APIs
                                • GetSystemMetrics.USER32(0000004C), ref: 00418519
                                • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                                • GetSystemMetrics.USER32(0000004E), ref: 00418525
                                • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: MetricsSystem
                                • String ID:
                                • API String ID: 4116985748-0
                                • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                                • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                                APIs
                                • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorHandling__start
                                • String ID: pow
                                • API String ID: 3213639722-2276729525
                                • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                                • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CountEventTick
                                • String ID: >G
                                • API String ID: 180926312-1296849874
                                • Opcode ID: ecb38262030e6fe4596be44c062513d2a0e9a1be1ae4ceaebf4b373dddf9393e
                                • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                • Opcode Fuzzy Hash: ecb38262030e6fe4596be44c062513d2a0e9a1be1ae4ceaebf4b373dddf9393e
                                • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                APIs
                                • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Info
                                • String ID: $fD
                                • API String ID: 1807457897-3092946448
                                • Opcode ID: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                • Opcode Fuzzy Hash: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                APIs
                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417C08
                                  • Part of subcall function 004177A2: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417C1B,00000000,?,?,?,?,00000000), ref: 004177B6
                                • SHCreateMemStream.SHLWAPI(00000000), ref: 00417C55
                                  • Part of subcall function 00417815: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417C71,00000000,?,?), ref: 00417827
                                  • Part of subcall function 004177C5: GdipDisposeImage.GDIPLUS(?,00417CCC), ref: 004177CE
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                • String ID: image/jpeg
                                • API String ID: 1291196975-3785015651
                                • Opcode ID: 8f3b30371828e1907736ebf26ac10b00a12ebc6a0bae61ebf375912b50c4f4ef
                                • Instruction ID: 3dbe320e324aa312c145f712c1d391ec03548c85c69305bb74e69b0931de3aa8
                                • Opcode Fuzzy Hash: 8f3b30371828e1907736ebf26ac10b00a12ebc6a0bae61ebf375912b50c4f4ef
                                • Instruction Fuzzy Hash: 13315C75508300AFC301AF65C884DAFBBF9FF8A704F000A2EF94597251DB79A905CBA6
                                APIs
                                • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450B39,?,00000050,?,?,?,?,?), ref: 004509B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ACP$OCP
                                • API String ID: 0-711371036
                                • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                APIs
                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417CF4
                                  • Part of subcall function 004177A2: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417C1B,00000000,?,?,?,?,00000000), ref: 004177B6
                                • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00417D19
                                  • Part of subcall function 00417815: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417C71,00000000,?,?), ref: 00417827
                                  • Part of subcall function 004177C5: GdipDisposeImage.GDIPLUS(?,00417CCC), ref: 004177CE
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                • String ID: image/png
                                • API String ID: 1291196975-2966254431
                                • Opcode ID: 3eb8dd80f54a72a5a0a9ed13ccec69a705e73992219fab643a786ff0acabb055
                                • Instruction ID: e3b7944e5392015f30009faa46d0af48502643625c308f0969f1fef2cb3c76d4
                                • Opcode Fuzzy Hash: 3eb8dd80f54a72a5a0a9ed13ccec69a705e73992219fab643a786ff0acabb055
                                • Instruction Fuzzy Hash: AA21A135204211AFC300AF61CC88CAFBBBDEFCA714F10052EF90693151DB399945CBA6
                                APIs
                                • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                Strings
                                • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime
                                • String ID: KeepAlive | Enabled | Timeout:
                                • API String ID: 481472006-1507639952
                                • Opcode ID: 88f98e07624f0cdc5f5406798babcb05efc51bc28ea43e2309e29ec04d21d8db
                                • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                                • Opcode Fuzzy Hash: 88f98e07624f0cdc5f5406798babcb05efc51bc28ea43e2309e29ec04d21d8db
                                • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: LG$XG
                                • API String ID: 0-1482930923
                                • Opcode ID: c15126115d7b74b818ce8cc4bfc83f894c4a74ec01747284a75d25f55942686d
                                • Instruction ID: b803d8f2fb0d60b71c32d24796bf113498d2ea24005d64aa96dbf80bf0db992b
                                • Opcode Fuzzy Hash: c15126115d7b74b818ce8cc4bfc83f894c4a74ec01747284a75d25f55942686d
                                • Instruction Fuzzy Hash: CE11A3B1D01654AACB20EFA998017CFB7A55F09725F14D06BED18EF281D3B9DB408B98
                                APIs
                                • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime
                                • String ID: | $%02i:%02i:%02i:%03i
                                • API String ID: 481472006-2430845779
                                • Opcode ID: 9b95a0a033af4e6b3b54331b4a103e7e6270c3a9d1cca9dd8a72674f32e816fd
                                • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                                • Opcode Fuzzy Hash: 9b95a0a033af4e6b3b54331b4a103e7e6270c3a9d1cca9dd8a72674f32e816fd
                                • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                                APIs
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00412612
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00412648
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: QueryValue
                                • String ID: TUF
                                • API String ID: 3660427363-3431404234
                                • Opcode ID: c4e216894b58aee55caec26845d8524ac01ef4dd0a633f9c8df4f60fb7a150f6
                                • Instruction ID: 62a4949b47554db758ef5e9b715c6ec4cc130d120bf99ac1ec1555789b8052d8
                                • Opcode Fuzzy Hash: c4e216894b58aee55caec26845d8524ac01ef4dd0a633f9c8df4f60fb7a150f6
                                • Instruction Fuzzy Hash: BC01A7B6A00108BFDB049B95DD46EFF7ABDDF44240F10007AF901E2251E6749F009664
                                APIs
                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                  • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                • String ID: Online Keylogger Stopped
                                • API String ID: 1623830855-1496645233
                                • Opcode ID: fe6e18c6252a0bee342ef941cd7d9d06612fb05f1df7cb5e72a2689b447559bc
                                • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                                • Opcode Fuzzy Hash: fe6e18c6252a0bee342ef941cd7d9d06612fb05f1df7cb5e72a2689b447559bc
                                • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                                APIs
                                • waveInPrepareHeader.WINMM(005DE7F8,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                • waveInAddBuffer.WINMM(005DE7F8,00000020,?,00000000,00401913), ref: 0040175D
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$BufferHeaderPrepare
                                • String ID: T=G
                                • API String ID: 2315374483-379896819
                                • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                APIs
                                  • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                  • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                  • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                  • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • _abort.LIBCMT ref: 0044DE19
                                • _free.LIBCMT ref: 0044DE4D
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_abort_free
                                • String ID: M]
                                • API String ID: 289325740-3023866013
                                • Opcode ID: cba5e3b893efa1f4c196fd8b6ab646112b65b39245522f8e75cb99aab8fd3b38
                                • Instruction ID: 263febff8c983af4c5f1177bd945a1efbcaaba8aa324727b7c5e6bdf69b19c8f
                                • Opcode Fuzzy Hash: cba5e3b893efa1f4c196fd8b6ab646112b65b39245522f8e75cb99aab8fd3b38
                                • Instruction Fuzzy Hash: A00152B1D02A21DBEB71AF69840125EB360AF58B51B65411BE954AB382C7386941CFCE
                                APIs
                                • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocaleValid
                                • String ID: IsValidLocaleName$j=D
                                • API String ID: 1901932003-3128777819
                                • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: H_prolog
                                • String ID: T=G$T=G
                                • API String ID: 3519838083-3732185208
                                • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                                • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: h ]
                                • API String ID: 269201875-970672737
                                • Opcode ID: e0c07418694881cfdc192a5642d2fc592dcbedec7190f7d1bd2a6cce8c9e4082
                                • Instruction ID: f0cf83c002af9be10e85dbd72a17715ce9ce30914f7b4b99b2350c0725a7183d
                                • Opcode Fuzzy Hash: e0c07418694881cfdc192a5642d2fc592dcbedec7190f7d1bd2a6cce8c9e4082
                                • Instruction Fuzzy Hash: 8CE0222260291130F23A623F6D0676B06458BC233CF19032BF825F62D1EFAC884395AE
                                APIs
                                • GetKeyState.USER32(00000011), ref: 0040AD5B
                                  • Part of subcall function 00409B10: GetForegroundWindow.USER32(?,?,004740F8), ref: 00409B3F
                                  • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                  • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                  • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                  • Part of subcall function 00409B10: GetKeyboardState.USER32(?,?,004740F8), ref: 00409B67
                                  • Part of subcall function 00409B10: ToUnicodeEx.USER32(0047414C,00000000,?,?,00000010,00000000,00000000), ref: 00409B8A
                                  • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                • String ID: [AltL]$[AltR]
                                • API String ID: 2738857842-2658077756
                                • Opcode ID: 0fd097a0a4b99d70b02a08e9004214b89ee8ccd3163f9cf7526c1a47b2b50f16
                                • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                • Opcode Fuzzy Hash: 0fd097a0a4b99d70b02a08e9004214b89ee8ccd3163f9cf7526c1a47b2b50f16
                                • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                APIs
                                • _free.LIBCMT ref: 00448825
                                  • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                  • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorFreeHeapLast_free
                                • String ID: `@$`@
                                • API String ID: 1353095263-20545824
                                • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                                • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                                APIs
                                • GetKeyState.USER32(00000012), ref: 0040ADB5
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: State
                                • String ID: [CtrlL]$[CtrlR]
                                • API String ID: 1649606143-2446555240
                                • Opcode ID: 8f256fbae12a6d1972e20e0d193ff0540306bf2bf736503aba8af0ee0077a29a
                                • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                • Opcode Fuzzy Hash: 8f256fbae12a6d1972e20e0d193ff0540306bf2bf736503aba8af0ee0077a29a
                                • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                APIs
                                • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,h5],004742F8,?,pth_unenc), ref: 00412988
                                • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412998
                                Strings
                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteOpenValue
                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                • API String ID: 2654517830-1051519024
                                • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                APIs
                                • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteDirectoryFileRemove
                                • String ID: pth_unenc
                                • API String ID: 3325800564-4028850238
                                • Opcode ID: 2e8d6704218f96b318e7a73bad0b28a6b8edcd2455483e95ffe0dafda84626ef
                                • Instruction ID: b68931c7331ddc333ece9e06749e281aefc344294653c9eba2f2de372e339d66
                                • Opcode Fuzzy Hash: 2e8d6704218f96b318e7a73bad0b28a6b8edcd2455483e95ffe0dafda84626ef
                                • Instruction Fuzzy Hash: FEE046715112108BC610AB31EC44AEBB398AB05316F00487FF8D3A36A1DE38A988CA98
                                APIs
                                • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                • WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ObjectProcessSingleTerminateWait
                                • String ID: pth_unenc
                                • API String ID: 1872346434-4028850238
                                • Opcode ID: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                • Instruction ID: 4302d9c34f7b4dbdac7fc8682473a51625df35810590c52ad239c14707b44b4b
                                • Opcode Fuzzy Hash: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                • Instruction Fuzzy Hash: C1D0C938559211AFD7614B68BC08B453B6AA745222F108277F828413F1C72598A4AE1C
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CommandLine
                                • String ID: '\
                                • API String ID: 3253501508-2132029512
                                • Opcode ID: 2702c5f118dd3839dbc4dd886e2cdb728e5ea39e06e223ea52f31eba807d30e7
                                • Instruction ID: 13d69598d350970c9b91df73096b24a53109b9b907d0ea4b726438dfa3130670
                                • Opcode Fuzzy Hash: 2702c5f118dd3839dbc4dd886e2cdb728e5ea39e06e223ea52f31eba807d30e7
                                • Instruction Fuzzy Hash: 09B0027D8157009FC7419F79BD5D1443BA0B75861339094B5DC19C7B35DA358085EF18
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                                • GetLastError.KERNEL32 ref: 0043FB02
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                                Memory Dump Source
                                • Source File: 00000005.00000002.3711956809.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000005.00000002.3711924625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712039138.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712070026.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000005.00000002.3712136692.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_400000_1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$ErrorLast
                                • String ID:
                                • API String ID: 1717984340-0
                                • Opcode ID: a3a9a9c7793c2081db5377885f607edf127f94d6c053b0090e31d102b176707d
                                • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                • Opcode Fuzzy Hash: a3a9a9c7793c2081db5377885f607edf127f94d6c053b0090e31d102b176707d
                                • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759